{"componentChunkName":"component---src-templates-blog-post-tsx","path":"/the-clouds-dark-side-how-criminals-are-using-cloud-services-for-cyber","result":{"data":{"site":{"siteMetadata":{"siteUrl":"https://guard.io","title":"Browser Protection | Data & Privacy Security | Guardio Personal Blog"},"pathPrefix":"/blog"},"contentfulBlogPost":{"slug":"the-clouds-dark-side-how-criminals-are-using-cloud-services-for-cyber","title":"The Clouds Dark Side: How Criminals Are Using Cloud Services For Cyber Espionage","metaTitle":"Uncovering the Threat of Cyber Espionage through Misuse of Cloud Services","showExitPop":true,"descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"Learn about the latest cyber security technologies and how they can help safeguard your business from online threats."}},"description":{"childMarkdownRemark":{"rawMarkdownBody":"The Clouds Dark Side: How Criminals Are Using Cloud Services For Cyber Espionage\n"}},"author":{"name":"Guardio Research Team","image":{"fixed":{"src":"//images.ctfassets.net/tdnn4v0n6ild/v5bpOxBzPLUixJR8Zbpua/a751652bd5ea109de649d28d600f9698/Frame_18.png?w=40&h=40&q=50&fit=fill"}}},"coverImage":{"fixed":{"width":810,"height":477,"src":"//images.ctfassets.net/tdnn4v0n6ild/62DjBj71gNPqSekpymvMyH/a1f1df8b21d44d977dec5619878a3669/The_Clouds_Dark_Side_3-min.png?w=810&h=477&q=50&fit=fill"}},"tags":["business cybersecurity","Online Security"],"publishDate":"2022-07-13T14:00+03:00","publishDateFormatted":"July 13th","body":{"childMarkdownRemark":{"tableOfContents":"","timeToRead":3,"htmlAst":{"type":"element","tagName":"div","properties":{},"children":[{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"The cloud has become an integral part of our lives, with many of us relying on it for everything from storing our photos and documents to accessing our email and social media accounts. However, as convenient as the cloud is, it also has a dark side."}]}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Criminals increasingly use cloud services to carry out cyber espionage and other malicious activities. While the cloud can offer a great deal of flexibility and convenience, it also presents some security risks that need to be considered."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"In particular, cybercriminals exploit the fact that cloud services are often hosted on servers located in different jurisdictions, making it difficult for law enforcement to track them down. In addition, the use of cloud services can make it difficult to determine who is behind a particular attack."}]},{"type":"element","tagName":"h3","properties":{},"children":[{"type":"text","value":"Run a free security scan in a few clicks"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":" is a Chrome extension that monitors suspicious activity and blocks hackers from stealing your data."}]},{"type":"element","tagName":"call-to-action","properties":{"id":"ad_install","href":"https://guard.io/lp","btn_label":"start free scan","title":"Clean up your browser and prevent future scams"},"children":[{"type":"text","value":"\nProtect yourself from money scams & other online threats, begin with a free scan.\n"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Cyber espionage is a serious problem that is only likely to increase as more and more businesses and individuals rely on the cloud. It is essential to be aware of the risks involved in using cloud services and to take steps to protect yourself from these threats."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"There are several steps you can take to protect yourself from cyber espionage, including:"}]},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Use a reputable and secure cloud service provider"}]},{"type":"text","value":": Choose a cloud service provider with robust security features and a good reputation."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Don't store sensitive data in the cloud"}]},{"type":"text","value":": Avoid storing sensitive data in the cloud. If you need to store this type of data, ensure it is encrypted."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Be aware of the risks of using cloud services:"}]},{"type":"text","value":" Be mindful of the risks involved in using cloud services and take steps to protect yourself from these threats."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Use a VPN:"}]},{"type":"text","value":" Use a virtual private network (VPN) to encrypt your data and help protect yourself from cyber espionage."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Keep your software up to date:"}]},{"type":"text","value":" Keep your operating system and other software up to date to help reduce cybercriminals' risk of being exploited."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Back up your data:"}]},{"type":"text","value":" Regularly back up your data to a secure location if you need to restore it."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Monitor your activity:"}]},{"type":"text","value":" Keep an eye on your training and look for any unusual or suspicious activity."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"element","tagName":"h3","properties":{},"children":[{"type":"text","value":"Run a free security scan in a few clicks"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":" is a Chrome extension that monitors suspicious activity and blocks hackers from stealing your data."}]},{"type":"element","tagName":"call-to-action","properties":{"id":"ad_install","href":"https://guard.io/lp","btn_label":"start free scan","title":"Clean up your browser and prevent future scams"},"children":[{"type":"text","value":"\nProtect yourself from money scams & other online threats, begin with a free scan.\n"}]},{"type":"element","tagName":"h2","properties":{"id":"identifying-suspicious-traffic-to-rogue-cloud-instances","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#identifying-suspicious-traffic-to-rogue-cloud-instances","ariaLabel":"identifying suspicious traffic to rogue cloud instances permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"Identifying Suspicious Traffic to Rogue Cloud Instances"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"When investigating a potential cyber-espionage case, it is critical to look for signs of suspicious activity. This can include identifying traffic to rogue cloud instances that scammers may use to host malicious content or conduct attacks."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Some indicators of suspicious activity include:"}]},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Unusual traffic patterns:"}]},{"type":"text","value":" If you see unusual traffic patterns, this may signify that something is not right."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"An unusually high number of requests:"}]},{"type":"text","value":" If you see an extraordinarily high number of requests to a particular cloud instance, this may be a sign that it is being used for malicious purposes."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Questionable content:"}]},{"type":"text","value":" If you see questionable content, this may signify that the cloud instance is being used to host malicious content."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Investigating these indicators can help you determine if a cloud instance is being used for malicious purposes. If you believe that a cloud instance is being used for cyber espionage, it is necessary to report this to the relevant authorities so that they can take action."}]},{"type":"element","tagName":"h2","properties":{"id":"what-to-do-if-you-are-a-victim-of-cyber-espionage","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#what-to-do-if-you-are-a-victim-of-cyber-espionage","ariaLabel":"what to do if you are a victim of cyber espionage permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"What to do if you are a victim of cyber espionage?"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"If you believe that you have been the victim of cyber espionage, it is essential to report this to the relevant authorities. You should also take steps to protect yourself from further attacks, such as changing your passwords and ensuring that your software is up to date, and taking steps to protect your data."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"As more and more businesses and individuals rely on the cloud for storage and computing, the risk of cyber espionage increases."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Cybercriminals are taking advantage of the fact that cloud services are often hosted on servers in different jurisdictions, making it difficult for law enforcement to track them down. In addition, the use of cloud services can make it difficult to determine who is behind a particular attack."}]},{"type":"element","tagName":"h3","properties":{},"children":[{"type":"text","value":"Run a free security scan in a few clicks"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":" is a Chrome extension that monitors suspicious activity and blocks hackers from stealing your data."}]},{"type":"element","tagName":"call-to-action","properties":{"id":"ad_install","href":"https://guard.io/lp","btn_label":"start free scan","title":"Clean up your browser and prevent future scams"},"children":[{"type":"text","value":"\nProtect yourself from money scams & other online threats, begin with a free scan.\n"}]}]}}},"exitPop":{"title":"Try Guardio For Free","buttonDest":"https://guard.io/lp","btnText":"Get Started Now","contentfulid":"default","image":null,"body":{"childMarkdownRemark":{"html":"

Install Guardio's Chrome extension to start your security checkup and scan for viruses, privacy violations and other browser threats.

"}}}},"allContentfulBlogPost":{"edges":[{"node":{"title":"Beware of Black Friday and Cyber Monday Scams: How to Avoid Falling Victim ","slug":"beware-of-black-friday-and-cyber-monday-scams-how-to-avoid-falling-victim","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/U694JmqKG6a7N9azexkdw/f09e848a6e217e5aa3181193ff99a4d4/Black_Friday.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/U694JmqKG6a7N9azexkdw/f09e848a6e217e5aa3181193ff99a4d4/Black_Friday.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/U694JmqKG6a7N9azexkdw/f09e848a6e217e5aa3181193ff99a4d4/Black_Friday.png?w=440&h=200&q=50&fm=webp 440w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/U694JmqKG6a7N9azexkdw/f09e848a6e217e5aa3181193ff99a4d4/Black_Friday.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/U694JmqKG6a7N9azexkdw/f09e848a6e217e5aa3181193ff99a4d4/Black_Friday.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/U694JmqKG6a7N9azexkdw/f09e848a6e217e5aa3181193ff99a4d4/Black_Friday.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/U694JmqKG6a7N9azexkdw/f09e848a6e217e5aa3181193ff99a4d4/Black_Friday.png?w=440&h=200&q=50&fm=png 440w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#181818","width":440,"height":199.99999999999997}},"tags":["scams","Cybercrime","Browser protection","Online Security","Online scams"],"publishDate":"November 22nd","body":{"childMarkdownRemark":{"timeToRead":11}},"description":{"childMarkdownRemark":{"excerpt":"Learn how to protect yourself from scams this holiday season with our tips on avoiding financial fraud and identity theft."}}}},{"node":{"title":"Hook, Line, and Sinker: Guardio's Guide to Foiling SMS Phishing","slug":"hook-line-and-sinker-guardios-guide-to-foiling-sms-phishers","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/1hhFEsLQJVbhfY7O66QTie/4cefd2d89c1fe9322da1dec4584af99d/shutterstock_2380326315.jpg?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/1hhFEsLQJVbhfY7O66QTie/4cefd2d89c1fe9322da1dec4584af99d/shutterstock_2380326315.jpg?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/1hhFEsLQJVbhfY7O66QTie/4cefd2d89c1fe9322da1dec4584af99d/shutterstock_2380326315.jpg?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/1hhFEsLQJVbhfY7O66QTie/4cefd2d89c1fe9322da1dec4584af99d/shutterstock_2380326315.jpg?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/1hhFEsLQJVbhfY7O66QTie/4cefd2d89c1fe9322da1dec4584af99d/shutterstock_2380326315.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/1hhFEsLQJVbhfY7O66QTie/4cefd2d89c1fe9322da1dec4584af99d/shutterstock_2380326315.jpg?w=110&h=50&fl=progressive&q=50&fm=jpg 110w,\n//images.ctfassets.net/tdnn4v0n6ild/1hhFEsLQJVbhfY7O66QTie/4cefd2d89c1fe9322da1dec4584af99d/shutterstock_2380326315.jpg?w=220&h=100&fl=progressive&q=50&fm=jpg 220w,\n//images.ctfassets.net/tdnn4v0n6ild/1hhFEsLQJVbhfY7O66QTie/4cefd2d89c1fe9322da1dec4584af99d/shutterstock_2380326315.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg 440w,\n//images.ctfassets.net/tdnn4v0n6ild/1hhFEsLQJVbhfY7O66QTie/4cefd2d89c1fe9322da1dec4584af99d/shutterstock_2380326315.jpg?w=880&h=400&fl=progressive&q=50&fm=jpg 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#080808","width":440,"height":199.99999999999997}},"tags":null,"publishDate":"November 21st","body":{"childMarkdownRemark":{"timeToRead":11}},"description":{"childMarkdownRemark":{"excerpt":"Curious about tackling SMS phishing? Dive into Guardio's solutions. Discover essential tips for detecting and preventing smishing, and learn how to step up your mobile security…"}}}},{"node":{"title":"Beware of the digital horrors: Unveiling 6 spooky Halloween scams in 2023","slug":"beware-of-the-digital-horrors-unveiling-6-spooky-halloween-scams-in-2023","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/11cDmAWcr9ea2zDCw3amaL/bcfc1d6491421ef6c01c352e87809be7/DALL_E_2023-10-26_17.10.17_-_Vector_graphic_of_an_old_mansion_with_ghostly_apparitions_floating_around_it__overlaid_with_a_b.png?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/11cDmAWcr9ea2zDCw3amaL/bcfc1d6491421ef6c01c352e87809be7/DALL_E_2023-10-26_17.10.17_-_Vector_graphic_of_an_old_mansion_with_ghostly_apparitions_floating_around_it__overlaid_with_a_b.png?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/11cDmAWcr9ea2zDCw3amaL/bcfc1d6491421ef6c01c352e87809be7/DALL_E_2023-10-26_17.10.17_-_Vector_graphic_of_an_old_mansion_with_ghostly_apparitions_floating_around_it__overlaid_with_a_b.png?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/11cDmAWcr9ea2zDCw3amaL/bcfc1d6491421ef6c01c352e87809be7/DALL_E_2023-10-26_17.10.17_-_Vector_graphic_of_an_old_mansion_with_ghostly_apparitions_floating_around_it__overlaid_with_a_b.png?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/11cDmAWcr9ea2zDCw3amaL/bcfc1d6491421ef6c01c352e87809be7/DALL_E_2023-10-26_17.10.17_-_Vector_graphic_of_an_old_mansion_with_ghostly_apparitions_floating_around_it__overlaid_with_a_b.png?w=440&h=200&q=50&fm=png","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/11cDmAWcr9ea2zDCw3amaL/bcfc1d6491421ef6c01c352e87809be7/DALL_E_2023-10-26_17.10.17_-_Vector_graphic_of_an_old_mansion_with_ghostly_apparitions_floating_around_it__overlaid_with_a_b.png?w=110&h=50&q=50&fm=png 110w,\n//images.ctfassets.net/tdnn4v0n6ild/11cDmAWcr9ea2zDCw3amaL/bcfc1d6491421ef6c01c352e87809be7/DALL_E_2023-10-26_17.10.17_-_Vector_graphic_of_an_old_mansion_with_ghostly_apparitions_floating_around_it__overlaid_with_a_b.png?w=220&h=100&q=50&fm=png 220w,\n//images.ctfassets.net/tdnn4v0n6ild/11cDmAWcr9ea2zDCw3amaL/bcfc1d6491421ef6c01c352e87809be7/DALL_E_2023-10-26_17.10.17_-_Vector_graphic_of_an_old_mansion_with_ghostly_apparitions_floating_around_it__overlaid_with_a_b.png?w=440&h=200&q=50&fm=png 440w,\n//images.ctfassets.net/tdnn4v0n6ild/11cDmAWcr9ea2zDCw3amaL/bcfc1d6491421ef6c01c352e87809be7/DALL_E_2023-10-26_17.10.17_-_Vector_graphic_of_an_old_mansion_with_ghostly_apparitions_floating_around_it__overlaid_with_a_b.png?w=880&h=400&q=50&fm=png 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#f8f8f8","width":440,"height":199.99999999999997}},"tags":["Halloween 2023 scams","Online scams","Scary scams","Guardio","Security software","Online security software","Stay safe","Guardio's on line tools"],"publishDate":"October 25th","body":{"childMarkdownRemark":{"timeToRead":11}},"description":{"childMarkdownRemark":{"excerpt":"In this article we cover 6 spooky online scams creeping up this Halloween.\nWe discuss signs to watch out for, and provide relevant tips to keep you protected. The article also…"}}}}]}},"pageContext":{"slug":"the-clouds-dark-side-how-criminals-are-using-cloud-services-for-cyber","breadcrumb":{"location":"/the-clouds-dark-side-how-criminals-are-using-cloud-services-for-cyber","crumbs":[{"pathname":"/","crumbLabel":"Blog"},{"pathname":"/the-clouds-dark-side-how-criminals-are-using-cloud-services-for-cyber","crumbLabel":"the-clouds-dark-side-how-criminals-are-using-cloud-services-for-cyber"}]}}},"staticQueryHashes":["1614255152"]}