Cloud attacks are getting faster and deadlier – 4 ways to secure your business


image-2.png

Jeffrey Hazelwood/ZDNET; Shutterstock/Google

Follow ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • AI is helping attackers exploit vulnerabilities faster than ever.
  • Most cloud attacks now target weak third-party software.
  • Businesses need automated, AI-powered defenses to keep up.

The jury is still out on whether most businesses get any measurable benefit from implementing artificial intelligence in their organizations, and the debate is likely to get more contentious over time.

But at least one sector is reaping massive productivity gains in this age of AI: Cybercriminals are more successful than ever at leveraging vulnerabilities to attack businesses in the cloud, where they’re most vulnerable.

Also: 5 ways to fortify your network against the new speed of AI attacks

That’s the conclusion of a March 2026 Cloud Threat Horizons Report from Google’s army of security investigators and engineers. Based on its observations from the second half of 2025, Google Cloud Security concluded, “The window between vulnerability disclosure and mass exploitation collapsed by an order of magnitude, from weeks to days.”

The report concludes that the best way to fight AI-powered attacks is with AI-augmented defenses: “This activity, along with AI-assisted attempts to probe targets for information and continued threat actor emphasis on data-focused theft, indicates that organizations should be turning to more automatic defenses.”

Sneaking in through third-party code

These days, Google’s report notes, security threats are not targeting the core infrastructure of services like Google Cloud, Amazon Web Services, and Microsoft Azure. Those high-value targets are well secured. Instead, threat actors (a polite term that encompasses both criminal gangs and state-sponsored agents, notably from North Korea) are targeting unpatched vulnerabilities in third-party code.

The report contains multiple detailed examples of these attacks — with victims not mentioned by name. 

Also: Stopping bugs before they ship: The shift to preventative security

One involved the exploitation of a critical remote code execution (RCE) vulnerability in React Server Components, a popular JavaScript library used to build user interfaces for websites and mobile apps; those attacks began within 48 hours of the public disclosure of the vulnerability (CVE-2025-55182, commonly referred to as React2Shell).

Another incident involved an RCE vulnerability in the popular XWiki Platform (CVE-2025-24893) that allowed attackers to run arbitrary code on a remote server by sending a specific search string. That bug was patched in June 2024, but the patch wasn’t widely deployed, and attackers (including crypto mining gangs) began exploiting it in earnest in November 2025.

A particularly juicy account involves a gang of state-sponsored attackers known as UNC4899, probably from North Korea, that took over Kubernetes workloads to steal millions of dollars in cryptocurrency. Here’s how the exploit unfolded:

UNC8499 targeted and lured an unsuspecting developer into downloading an archive file on the pretext of an open source project collaboration. The developer soon after transferred the same file from their personal device to their corporate workstation over Airdrop. Using their AI-assisted Integrated Development Environment (IDE), the victim then interacted with the archive’s contents, eventually executing the embedded malicious Python code, which spawned and executed a binary that masqueraded as the Kubernetes command-line tool. The binary beaconed out to UNC4899-controlled domains and served as the backdoor that gave the threat actors access to the victim’s workstation, effectively granting them a foothold into the corporate network.

Another incident involved a series of steps that started with a compromised Node Package Manager package that stole a developer’s GitHub token, used it to access Amazon Web Services, stole files stored in an AWS S3 bucket, and then destroyed the originals. That all happened within 72 hours.

Compromising identity

The other major finding is a shift away from attacking weak credentials with brute force attacks in favor of exploiting identity issues through a variety of techniques:

  • 17% of cases involved voice-based social engineering (aka, vishing).
  • 12% relied on email phishing.
  • 21% involved compromised trusted relationships with third parties.
  • 21% involved actors leveraging stolen human and non-human identities.
  • 7% resulted from actors gaining access through improperly configured application and infrastructure assets.

And the attackers aren’t always coming from far away. The report notes that “malicious insiders” — including employees, contractors, consultants, and interns — are sending confidential data outside the organization. Increasingly, this type of incident involves platform-agnostic, consumer-focused cloud storage services like Google Drive, Dropbox, Microsoft OneDrive, and Apple iCloud. 

The report calls this “the most rapidly growing means of exfiltrating data from an organization.”

One ominous note is that attackers these days are taking their sweet time before making their presence known. The report notes that “45% of intrusions resulted in data theft without immediate extortion attempts at the time of the engagement, and these were often characterized by prolonged dwell times and stealthy persistence.”

What can businesses do to protect themselves?

Each section of the report includes recommendations for IT professionals to follow for securing cloud infrastructure. Those guidelines are divided into two categories: specific advice for Google Cloud customers and more general guidance for customers using other platforms.

Also: The patching treadmill: Why traditional application security is no longer enough

If you’re an admin at a large organization with security responsibilities, that advice is worth careful consideration and incorporation into your existing security measures.

But what are small and medium-sized businesses supposed to do? Here are four action items:

  1. Step up your patching game by ensuring all software applications, especially third-party apps, are automatically updated.
  2. Strengthen Identity and Access Management (IAM), using multi-factor authentication and ensuring that only authorized users have access to administrative tools.
  3. Monitor the network with an eye toward identifying unusual activity and data movement. This includes attacks from the outside and insider threats.
  4. Have an incident response plan ready to go at the first sign of an intrusion. Those first few hours can be crucial, and scrambling to assemble investigative and containment resources can take days if you’re not prepared.

For small businesses without security experts on staff, the best solution is to find a managed service provider with the skills and experience you need. You do not want to start that search after an attacker has already succeeded.





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Love him or hate him, Seth MacFarlane has an immovable place in the realm of TV comedy, and Ted is an excellent showcase for the writer at his best. A seasoned actor and writer of over 3 decades, he has created numerous hit productions, including adult animation tentpoles like Family Guy and American Dad!, as well as The Orville.

However, his talents have also allowed him to make the leap from television to the big screen, including his 2012 comedy Ted, which asked what would happen to a child who wished their teddy bear for life once they grew into adults.

However, in 2024, MacFarlane brought Ted to the small screen with a television series that dived into the times not seen in the 2012 movie. And I personally feel that the show has become one of MacFarlane’s finest projects to date:

How Does Ted Tie Into The Movies?

A new side of John and Ted

Ted is set between the opening 1985 sequence of the original 2012 movie and the present-day sequence, honing in on John’s teenage years at high school as Max Burkholder takes on the role. When Ted pushes things too far, he is forced to attend school with John, leading to the pair experiencing many major developmental milestones together. From falling in love to going against his parents’ wishes and trying weed for the first time, the pair take on the world together.

Alongside the main duo, Ted also shines a light on the rest of the Bennett household. Frequent MacFarlane collaborator Scott Grimes takes on the voice of John’s loudmouthed conservative father Matty, while Alanna Ubach portrays his soft-spoken, good-hearted mother Susan. The Bennett family is rounded out by Giorgia Wigham’s Blaire, John’s politically minded cousin staying with the family who is always looking out for the leading pair.

A new addition to the lore

Much like Family Guy and American Dad took on The Simpsons‘ animated family sitcom and The Orville lampooned Star Trek, Ted twists a certain style of sitcom. There have been no shortage of throwback sitcoms set in the past since the late 2010s, with The Goldbergs and Young Sheldon playing into the nostalgia people either have for that time or recognize through long-running franchises or series like Stranger Things to attract viewer attention.

In Ted, the show turns its lens to the 1990s, with Blaire being part of the youthful generation who wants to challenge the status quo. However, she butts heads with various authority figures. Plus, Matty and Jon find themselves affected by the OJ Simpson case in varying ways.

Collage featuring 1990s sitcoms around an old TV.


Go Retro and Stream These 10 Sitcoms of the 1990s

These are the 1990s prime time sitcoms that have held up better than my collection of Pogs.

Despite this setting and inevitable plays on the events of the decade, the show isn’t entirely dependent on nostalgia. Ted’s very existence already set the series up in a position where it could do anything, and MacFarlane doesn’t hold back. From new talking toys and the relatable gag about how hot McDonald’s apple pies are to an entire episode that cuts between the group playing a Dungeons and Dragons game around a table and their characters within the game’s world, the series isn’t afraid to get strange. Because of that, it is hard to find an underwhelming episode throughout its run.

Ted has a surprising amount of heart

Is this the best of Seth MacFarlane?

While MacFarlane is a seasoned comedic writer whom audiences are incredibly familiar with, from his strengths to his stylistic flaws, I do feel that Ted is, for the most part, the best of what he has to offer. The series does have the sharper edge his humor can have at times, with Ted himself having some absolutely devastating insults towards the bullies at John’s school, as well as the cast overall tiptoeing between crass humor and smartly written gags. But this is a story about a bear brought to life with a child’s wish, so there is always a good deal of heart within every episode.

Thanks to the incredible chemistry between the cast, the Bennett family unit is easy to root for. Part of the enjoyment of the show is seeing John grow into the man he was in the original movie, but it is also heartwarming to see Blaire find her place in the Bennett household, even if she butts heads with Matty. Meanwhile, even Matty has several moments of vulnerability despite his hard-headed, typically politically incorrect self, which show just why Susan, who is the delightful and lovable heart of the show, fell for him.

One week the family may be playing a Dungeons and Dragons game to replenish their stash of weed, and the next will see them dedicating themselves to fulfilling Susan’s unrealized dream or helping Matty through the stranger side of his experiences in Vietnam. Even John’s bully Clive (Jackson Seavor McDonald) gets an off-kilter spotlight where the leading pair go from pulling a horrible revenge prank on him to becoming his unlikely father figures. MacFarlane’s edge is always there, but there is always a softer side to tug at your heartstrings and cushion you if not every gag lands.​​​​​​​

Where to watch Ted

All episodes are now streaming

Ted falls out of the tumble dryer in Ted. Credit: Peacock

​​​​​​​ Both seasons of Ted are currently available in their entirety on Peacock. Season 1 consists of 7 episodes, while season 2 received a larger episode count of 8. However, even after having an overall positive response and viral attention thanks to shared and reposted clips, MacFarlane confirmed that there were no current plans for season 3, as the costs to bring Ted to life on a television budget are incredibly high.

However, as Ted said himself, “Don’t be sad because it’s over; be happy because it happened.” Even against the costs, MacFarlane set out to ensure that Ted’s surprising expansion into television would still be a fulfilling experience, ensuring that the series could at least end on a satisfying note. As such, if you wish to see just how having an irresponsible magical stuffed friend shaped John’s life ahead of the movies, you will not be disappointed.​​​​​​​



Source link