This article has been indexed from Dark Reading
The vast majority of cloud workload compromises stem from poor security configurations or compromised passwords, while cryptojacking is the common payload, research shows.
Read the original article: Google Analyzes Methods Behind GCP Workload Attacks