Read more on google

Smooth criminals talking their way into cloud environments, Google says

Voice phishing is second most common initial access method across all IR probes, and top in cloud break-ins

RSAC 2026  Voice phishing surged last year to become the second most common method used by cybercriminals to gain initial access to their victims' IT estate – and the No. 1 tactic used when breaking into cloud environments.…