Rubén Alonso | Head of Secure
Development Unit, Telefonica
A practical breakdown of crypto jacking from attacker entry points to cloud and Kubernetes-scale resource hijacking, plus the controls and validation strategies organizations need to detect and stop stealthy mining operations before costs and exposure spiral.