AI Vulnerabilities vs. Traditional Vulnerabilities: How the AI Attack Surface Changes Security

AI Vulnerabilities

Artificial intelligence is rapidly becoming embedded in core engineering workflows. Organizations are integrating LLMs into customer-facing applications, code generation pipelines, triage automation, and even parts of their CI/CD and cloud-management ecosystems. But the moment AI crossed into production, a new reality emerged: AI vulnerabilities behave fundamentally differently from traditional software vulnerabilities. They don’t follow the […]

How We Impersonated Cloud Code by Google Cloud and Took Over GCP Accounts

A beach scene with palm trees and ocean waves under a blue sky. A sign reads, Upwind Research: How We Impersonated Cloud Code by Google Cloud to Take Over GCP Accounts with the Google Cloud logo. The Upwind logo is at the top right.

The Upwind security research team is constantly examining threat landscapes and potential attack paths. In one of our recent searches, we discovered an anomaly in the authentication behavior of Google Developer tools that security practitioners should be aware of.  We discovered this threat landscape by running scans on GCP Cloud Code, during which we found […]