Attackers could even have used one vulnerable Lookout user to gain access to other Google Cloud tenants' environments.
No installs required: history search, redirection, job control, completions, and other built-in terminal features that ...