Researchers could access sensitive data and steal secrets by exploiting a vulnerability in GCP’s security layer, eventually running rampant in the environment.
Researchers could access sensitive data and steal secrets by exploiting a vulnerability in GCP’s security layer, eventually running rampant in the environment.