This document discusses security issues related to the abuse and nefarious use of cloud computing. It begins by providing background on cloud computing and outlines some key motivations for security concerns, including that cloud environments present new risks compared to traditional computing due to virtualization and changes in trust boundaries. The document then examines several specific security threats enabled by cloud computing, such as using cloud services to launch DDoS attacks, host malicious data, run password cracking tools, and control botnets. It analyzes issues like easy registration processes, dynamically changing IP addresses, and blacklisting of cloud IP ranges that can allow malicious actors to evade detection. The document aims to understand the taxonomy of cloud security threats and discuss past, current and potential future