{"componentChunkName":"component---src-templates-blog-post-tsx","path":"/the-clouds-dark-side-how-criminals-are-using-cloud-services-for-cyber","result":{"data":{"site":{"siteMetadata":{"siteUrl":"https://guard.io","title":"Browser Protection | Data & Privacy Security | Guardio Personal Blog"},"pathPrefix":"/blog"},"contentfulBlogPost":{"slug":"the-clouds-dark-side-how-criminals-are-using-cloud-services-for-cyber","title":"The Clouds Dark Side: How Criminals Are Using Cloud Services For Cyber Espionage","metaTitle":"Uncovering the Threat of Cyber Espionage through Misuse of Cloud Services","showExitPop":true,"descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"Learn about the latest cyber security technologies and how they can help safeguard your business from online threats."}},"description":{"childMarkdownRemark":{"rawMarkdownBody":"The Clouds Dark Side: How Criminals Are Using Cloud Services For Cyber Espionage\n"}},"author":{"name":"Guardio Research Team","image":{"fixed":{"src":"//images.ctfassets.net/tdnn4v0n6ild/v5bpOxBzPLUixJR8Zbpua/a751652bd5ea109de649d28d600f9698/Frame_18.png?w=40&h=40&q=50&fit=fill"}}},"coverImage":{"fixed":{"width":810,"height":477,"src":"//images.ctfassets.net/tdnn4v0n6ild/62DjBj71gNPqSekpymvMyH/a1f1df8b21d44d977dec5619878a3669/The_Clouds_Dark_Side_3-min.png?w=810&h=477&q=50&fit=fill"}},"tags":["business cybersecurity","Online Security"],"publishDate":"2022-07-13T14:00+03:00","publishDateFormatted":"July 13th","body":{"childMarkdownRemark":{"tableOfContents":"","timeToRead":3,"htmlAst":{"type":"element","tagName":"div","properties":{},"children":[{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"The cloud has become an integral part of our lives, with many of us relying on it for everything from storing our photos and documents to accessing our email and social media accounts. However, as convenient as the cloud is, it also has a dark side."}]}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Criminals increasingly use cloud services to carry out cyber espionage and other malicious activities. While the cloud can offer a great deal of flexibility and convenience, it also presents some security risks that need to be considered."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"In particular, cybercriminals exploit the fact that cloud services are often hosted on servers located in different jurisdictions, making it difficult for law enforcement to track them down. In addition, the use of cloud services can make it difficult to determine who is behind a particular attack."}]},{"type":"element","tagName":"h3","properties":{},"children":[{"type":"text","value":"Run a free security scan in a few clicks"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":" is a Chrome extension that monitors suspicious activity and blocks hackers from stealing your data."}]},{"type":"element","tagName":"call-to-action","properties":{"id":"ad_install","href":"https://guard.io/lp","btn_label":"start free scan","title":"Clean up your browser and prevent future scams"},"children":[{"type":"text","value":"\nProtect yourself from money scams & other online threats, begin with a free scan.\n"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Cyber espionage is a serious problem that is only likely to increase as more and more businesses and individuals rely on the cloud. It is essential to be aware of the risks involved in using cloud services and to take steps to protect yourself from these threats."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"There are several steps you can take to protect yourself from cyber espionage, including:"}]},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Use a reputable and secure cloud service provider"}]},{"type":"text","value":": Choose a cloud service provider with robust security features and a good reputation."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Don't store sensitive data in the cloud"}]},{"type":"text","value":": Avoid storing sensitive data in the cloud. If you need to store this type of data, ensure it is encrypted."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Be aware of the risks of using cloud services:"}]},{"type":"text","value":" Be mindful of the risks involved in using cloud services and take steps to protect yourself from these threats."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Use a VPN:"}]},{"type":"text","value":" Use a virtual private network (VPN) to encrypt your data and help protect yourself from cyber espionage."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Keep your software up to date:"}]},{"type":"text","value":" Keep your operating system and other software up to date to help reduce cybercriminals' risk of being exploited."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Back up your data:"}]},{"type":"text","value":" Regularly back up your data to a secure location if you need to restore it."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Monitor your activity:"}]},{"type":"text","value":" Keep an eye on your training and look for any unusual or suspicious activity."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"element","tagName":"h3","properties":{},"children":[{"type":"text","value":"Run a free security scan in a few clicks"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":" is a Chrome extension that monitors suspicious activity and blocks hackers from stealing your data."}]},{"type":"element","tagName":"call-to-action","properties":{"id":"ad_install","href":"https://guard.io/lp","btn_label":"start free scan","title":"Clean up your browser and prevent future scams"},"children":[{"type":"text","value":"\nProtect yourself from money scams & other online threats, begin with a free scan.\n"}]},{"type":"element","tagName":"h2","properties":{"id":"identifying-suspicious-traffic-to-rogue-cloud-instances","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#identifying-suspicious-traffic-to-rogue-cloud-instances","ariaLabel":"identifying suspicious traffic to rogue cloud instances permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"Identifying Suspicious Traffic to Rogue Cloud Instances"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"When investigating a potential cyber-espionage case, it is critical to look for signs of suspicious activity. This can include identifying traffic to rogue cloud instances that scammers may use to host malicious content or conduct attacks."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Some indicators of suspicious activity include:"}]},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Unusual traffic patterns:"}]},{"type":"text","value":" If you see unusual traffic patterns, this may signify that something is not right."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"An unusually high number of requests:"}]},{"type":"text","value":" If you see an extraordinarily high number of requests to a particular cloud instance, this may be a sign that it is being used for malicious purposes."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Questionable content:"}]},{"type":"text","value":" If you see questionable content, this may signify that the cloud instance is being used to host malicious content."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Investigating these indicators can help you determine if a cloud instance is being used for malicious purposes. If you believe that a cloud instance is being used for cyber espionage, it is necessary to report this to the relevant authorities so that they can take action."}]},{"type":"element","tagName":"h2","properties":{"id":"what-to-do-if-you-are-a-victim-of-cyber-espionage","style":"position:relative;"},"children":[{"type":"element","tagName":"a","properties":{"href":"#what-to-do-if-you-are-a-victim-of-cyber-espionage","ariaLabel":"what to do if you are a victim of cyber espionage permalink","className":["anchor","before"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]},{"type":"text","value":"What to do if you are a victim of cyber espionage?"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"If you believe that you have been the victim of cyber espionage, it is essential to report this to the relevant authorities. You should also take steps to protect yourself from further attacks, such as changing your passwords and ensuring that your software is up to date, and taking steps to protect your data."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"As more and more businesses and individuals rely on the cloud for storage and computing, the risk of cyber espionage increases."}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Cybercriminals are taking advantage of the fact that cloud services are often hosted on servers in different jurisdictions, making it difficult for law enforcement to track them down. In addition, the use of cloud services can make it difficult to determine who is behind a particular attack."}]},{"type":"element","tagName":"h3","properties":{},"children":[{"type":"text","value":"Run a free security scan in a few clicks"}]},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":" is a Chrome extension that monitors suspicious activity and blocks hackers from stealing your data."}]},{"type":"element","tagName":"call-to-action","properties":{"id":"ad_install","href":"https://guard.io/lp","btn_label":"start free scan","title":"Clean up your browser and prevent future scams"},"children":[{"type":"text","value":"\nProtect yourself from money scams & other online threats, begin with a free scan.\n"}]}]}}},"exitPop":{"title":"Stay safe online","buttonDest":"https://guard.io/lp","btnText":"Get Started Now","contentfulid":"default","image":{"fixed":{"width":420,"height":250,"src":"//images.ctfassets.net/tdnn4v0n6ild/2nsINtiyvjptpsLBcQzfpa/16bd7cbf6cfb39f1cde72cc5e4a5424b/A_digital_landscape_showing_a_bustling_online_world_with_numerous_connected_devices_like_smartphones__laptops__and_tablets._.png?w=420&h=250&q=50&fit=fill"}},"body":{"childMarkdownRemark":{"html":"

Stay one step ahead with Guardio. Secure your digital world today and start with a free 7-day trial – your safety net against online scams.

"}}}},"allContentfulBlogPost":{"edges":[{"node":{"title":"Do Banks Refund Scammed Money? 7 Tips to Avoid Scams","slug":"do-banks-refund-scammed-money","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/17zlt1Gq939osHuc6WKZAV/bd2d04c59d65c3fd8014db14ce28fd84/do-banks-refund-scammed-money.jpg?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/17zlt1Gq939osHuc6WKZAV/bd2d04c59d65c3fd8014db14ce28fd84/do-banks-refund-scammed-money.jpg?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/17zlt1Gq939osHuc6WKZAV/bd2d04c59d65c3fd8014db14ce28fd84/do-banks-refund-scammed-money.jpg?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/17zlt1Gq939osHuc6WKZAV/bd2d04c59d65c3fd8014db14ce28fd84/do-banks-refund-scammed-money.jpg?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/17zlt1Gq939osHuc6WKZAV/bd2d04c59d65c3fd8014db14ce28fd84/do-banks-refund-scammed-money.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/17zlt1Gq939osHuc6WKZAV/bd2d04c59d65c3fd8014db14ce28fd84/do-banks-refund-scammed-money.jpg?w=110&h=50&fl=progressive&q=50&fm=jpg 110w,\n//images.ctfassets.net/tdnn4v0n6ild/17zlt1Gq939osHuc6WKZAV/bd2d04c59d65c3fd8014db14ce28fd84/do-banks-refund-scammed-money.jpg?w=220&h=100&fl=progressive&q=50&fm=jpg 220w,\n//images.ctfassets.net/tdnn4v0n6ild/17zlt1Gq939osHuc6WKZAV/bd2d04c59d65c3fd8014db14ce28fd84/do-banks-refund-scammed-money.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg 440w,\n//images.ctfassets.net/tdnn4v0n6ild/17zlt1Gq939osHuc6WKZAV/bd2d04c59d65c3fd8014db14ce28fd84/do-banks-refund-scammed-money.jpg?w=880&h=400&fl=progressive&q=50&fm=jpg 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#181818","width":440,"height":199.99999999999997}},"tags":null,"publishDate":"April 6th","body":{"childMarkdownRemark":{"timeToRead":12}},"description":{"childMarkdownRemark":{"excerpt":"Scammers are getting smarter, but do banks refund scammed money? This guide explains when banks issue refunds, common fraud scenarios, and proactive steps to protect your finances."}}}},{"node":{"title":"Steam Tops Q1 2025 Most Imitated Brands, Followed by Surge in Toll Pass Scams","slug":"most-imitated-brands-phishing-scams-q1-2025","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/4Mok7lbJsosqOCPFo4zWF3/fc64b32b66b36b887ebc7fbd14473a74/most-imitated-brands-q1-2025.jpg?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/4Mok7lbJsosqOCPFo4zWF3/fc64b32b66b36b887ebc7fbd14473a74/most-imitated-brands-q1-2025.jpg?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/4Mok7lbJsosqOCPFo4zWF3/fc64b32b66b36b887ebc7fbd14473a74/most-imitated-brands-q1-2025.jpg?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/4Mok7lbJsosqOCPFo4zWF3/fc64b32b66b36b887ebc7fbd14473a74/most-imitated-brands-q1-2025.jpg?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/4Mok7lbJsosqOCPFo4zWF3/fc64b32b66b36b887ebc7fbd14473a74/most-imitated-brands-q1-2025.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/4Mok7lbJsosqOCPFo4zWF3/fc64b32b66b36b887ebc7fbd14473a74/most-imitated-brands-q1-2025.jpg?w=110&h=50&fl=progressive&q=50&fm=jpg 110w,\n//images.ctfassets.net/tdnn4v0n6ild/4Mok7lbJsosqOCPFo4zWF3/fc64b32b66b36b887ebc7fbd14473a74/most-imitated-brands-q1-2025.jpg?w=220&h=100&fl=progressive&q=50&fm=jpg 220w,\n//images.ctfassets.net/tdnn4v0n6ild/4Mok7lbJsosqOCPFo4zWF3/fc64b32b66b36b887ebc7fbd14473a74/most-imitated-brands-q1-2025.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg 440w,\n//images.ctfassets.net/tdnn4v0n6ild/4Mok7lbJsosqOCPFo4zWF3/fc64b32b66b36b887ebc7fbd14473a74/most-imitated-brands-q1-2025.jpg?w=880&h=400&fl=progressive&q=50&fm=jpg 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#281838","width":440,"height":199.99999999999997}},"tags":null,"publishDate":"April 3rd","body":{"childMarkdownRemark":{"timeToRead":6}},"description":{"childMarkdownRemark":{"excerpt":"Steam leads Q1 2025 phishing scams as the most-imitated brand, with toll pass and tax scams on the rise. Stay alert with the latest scam protection tips."}}}},{"node":{"title":"Is @support.facebook.com a Legit Email?","slug":"is-support-facebook-com-legit-email","coverImage":{"gatsbyImageData":{"images":{"sources":[{"srcSet":"//images.ctfassets.net/tdnn4v0n6ild/16b3m1zM4UXAQwBy3M1Wir/fe1c9867710de05d4762ff305aa91405/facebook-legit-email.jpg?w=110&h=50&q=50&fm=webp 110w,\n//images.ctfassets.net/tdnn4v0n6ild/16b3m1zM4UXAQwBy3M1Wir/fe1c9867710de05d4762ff305aa91405/facebook-legit-email.jpg?w=220&h=100&q=50&fm=webp 220w,\n//images.ctfassets.net/tdnn4v0n6ild/16b3m1zM4UXAQwBy3M1Wir/fe1c9867710de05d4762ff305aa91405/facebook-legit-email.jpg?w=440&h=200&q=50&fm=webp 440w,\n//images.ctfassets.net/tdnn4v0n6ild/16b3m1zM4UXAQwBy3M1Wir/fe1c9867710de05d4762ff305aa91405/facebook-legit-email.jpg?w=880&h=400&q=50&fm=webp 880w","sizes":"(min-width: 440px) 440px, 100vw","type":"image/webp"}],"fallback":{"src":"//images.ctfassets.net/tdnn4v0n6ild/16b3m1zM4UXAQwBy3M1Wir/fe1c9867710de05d4762ff305aa91405/facebook-legit-email.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg","srcSet":"//images.ctfassets.net/tdnn4v0n6ild/16b3m1zM4UXAQwBy3M1Wir/fe1c9867710de05d4762ff305aa91405/facebook-legit-email.jpg?w=110&h=50&fl=progressive&q=50&fm=jpg 110w,\n//images.ctfassets.net/tdnn4v0n6ild/16b3m1zM4UXAQwBy3M1Wir/fe1c9867710de05d4762ff305aa91405/facebook-legit-email.jpg?w=220&h=100&fl=progressive&q=50&fm=jpg 220w,\n//images.ctfassets.net/tdnn4v0n6ild/16b3m1zM4UXAQwBy3M1Wir/fe1c9867710de05d4762ff305aa91405/facebook-legit-email.jpg?w=440&h=200&fl=progressive&q=50&fm=jpg 440w,\n//images.ctfassets.net/tdnn4v0n6ild/16b3m1zM4UXAQwBy3M1Wir/fe1c9867710de05d4762ff305aa91405/facebook-legit-email.jpg?w=880&h=400&fl=progressive&q=50&fm=jpg 880w","sizes":"(min-width: 440px) 440px, 100vw"}},"layout":"constrained","backgroundColor":"#2888e8","width":440,"height":199.99999999999997}},"tags":null,"publishDate":"March 27th","body":{"childMarkdownRemark":{"timeToRead":8}},"description":{"childMarkdownRemark":{"excerpt":"Is @support.facebook.com a real Facebook email or a scam? Learn how to verify official Facebook emails, recognize phishing attempts, and protect your account with best practices and…"}}}}]}},"pageContext":{"slug":"the-clouds-dark-side-how-criminals-are-using-cloud-services-for-cyber","breadcrumb":{"location":"/the-clouds-dark-side-how-criminals-are-using-cloud-services-for-cyber","crumbs":[{"pathname":"/","crumbLabel":"Blog"},{"pathname":"/the-clouds-dark-side-how-criminals-are-using-cloud-services-for-cyber","crumbLabel":"the-clouds-dark-side-how-criminals-are-using-cloud-services-for-cyber"}]}}},"staticQueryHashes":["1614255152"]}