Cybercriminals Could Abuse Misconfigured Google Cloud API for Credential Theft and Lateral Movement
If GCP is not configured correctly, it could be exploited by attackers to engage in malicious activity inside a user’s cloud environment, according to cloud security company Mitiga