‘The cloud threat landscape is changing rapidly’: Google research warns hackers are targeting third parties and software flaws to get in



  • Google report shows attackers turning to software flaws instead of weak credentials
  • Vulnerabilities now account for 44.5% of cloud breaches and are exploited within days.
  • Third-party SaaS integrations are increasingly abused for data theft and access

To break into cloud environments, cybercriminals rely less on weak credentials and more on third-party software vulnerabilities, according to new research from Google.

The Cloud Threat Horizons report states that in early 2025 most compromises still depended on weak or missing credentials. However, in the second half of the year, attackers increasingly began to exploit vulnerabilities in externally managed software.



Leave a Comment

Your email address will not be published. Required fields are marked *