From misconfigured cloud environments to wormable crypto-miners; how vulnerable βtestβ and βdemoβ environments turned into an entry point to leading security vendorsβ and fortune 500 companies.