Security researchers discussed vulnerabilities in Infrastructure-as-code (IaC) There are a number of different ways crooks ...