‘Cloud threat landscape is changing rapidly’: Google research warns hackers are targeting third parties and software flaws to gain access


  • Google report shows that attackers are switching to software flaws over weak credentials
  • Vulnerabilities now account for 44.5% of cloud breaches, exploited within days
  • Third-party SaaS integrations are increasingly being abused for data theft and access

To break into cloud environments, cybercriminals are relying less on weak credentials and more on third-party software vulnerabilities, new research from Google has found.

The Cloud Threat Horizons report claims that as early as 2025, most compromises still relied on weak or missing credentials. But in the second half of the year, attackers began to increasingly exploit vulnerabilities in externally managed software.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top