Google has released the latest Google Cloud Threat Horizons report! 

The report highlights the growing threat of attacks on cloud services due to weak or non-existent credentials.

Attacks using weak or non-existent credentials accounted for nearly half of all observed intrusions, while misconfiguration of cloud services was the second most common initial access vector.


Remember! ☁️ The Cloud, whatever it may be, is only as secure as its weakest link. 

So check your configurations, ask your cybersecurity experts what can be improved, and .... implement it (After business considerations, of course).