thumbnail Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments
thumbnail MERCURY and DEV-1084: Destructive attack on hybrid environment - Microsoft Security Blog