#Get malwarebytes premium free full#
Unfortunately there are no details in the summary, and the full report doesn’t go into the nitty-gritty of what happened either. This sounds interesting, and would probably be useful to know more about it. In case you’re wondering, GCP means Google Cloud Platform.Įlsewhere, the summary mentions Google cloud resources were used to generate bogus YouTube view counts. Additionally, 10% of compromised cloud instances were used to conduct scans of other publicly available resources on the internet to identify vulnerable systems, and 8% of instances were used to attack other targets”. “Of 50 recently compromised GCP instances, 86% of the compromised cloud instances were used to perform cryptocurrency mining, a cloud resource-intensive, for profit activity. There’s a strong focus on issues and concerns for people using Google services. The executive summary lists a number of key points. After all, if they can’t do that then complex rundowns stand no chance. It makes sense to keep it simple in an effort to have people pay attention and nail the basics first. They may be taking the “gently does it” approach because so many of their customers are falling foul to bad things.
Perhaps this is a way of easing the people the report is aimed at into the wider discussion.Īt any rate, the report is out and I think it’s worth digging into. On the other hand, many businesses simply don’t understand many of the threats at large. It’s taken some criticism for being surprisingly straightforward and less complex than you may expect. Google’s Cybersecurity Action Team has released a Threat Horizons report focusing on cloud security.