How to Defend Against These Cloud Hacking Techniques?