Researchers have discovered a misconfiguration in Google Cloud Platform that might allow threat actors to take complete control of a target virtual machine (VM) endpoint, according to the researchers.
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.