In a previous post, I mentioned that the attack vector for the Capital One breach specifically targeted an EC2 feature. In this post, I'll give my educated guesses about how the attack actually worked. [Note 1: if anyone happens to have any of the contents of the original gist then I'd love to get a look...The post Capital One and EC2 - part 2 appeared first on RunAsCloud.