Vulnerable training and demo applications exposed to the public internet are being actively exploited and used as entry points for full cloud account compromise at major enterprises, including Fortune ...