Attackers could even have used one vulnerable Lookout user to gain access to other Google Cloud tenants' environments.
Oh, sure, I can “code.” That is, I can flail my way through a block of (relatively simple) pseudocode and follow the flow. I ...