Sign Up to Our Newsletter

Be the first to know the latest tech updates

Tech News

‘The cloud threat landscape is rapidly shifting’: Google research warns hackers are targeting third parties and software flaws to gain entry

‘The cloud threat landscape is rapidly shifting’: Google research warns hackers are targeting third parties and software flaws to gain entry



  • Google report shows attackers shifting to software flaws over weak credentials
  • Vulnerabilities now account for 44.5% of cloud breaches, exploited within days
  • Third-party SaaS integrations increasingly abused for data theft and access

To break into cloud environments, cybercriminals are relying less on weak credentials and more on third-party software vulnerabilities, new research from Google has found.

The Cloud Threat Horizons Report claims early in 2025 most compromises still relied on weak, or missing credentials. However, in the second half of the year, attackers increasingly started exploiting vulnerabilities in externally managed software.

The shift was quite significant, too. Software vulnerabilities now account for 44.5% of initial access vectors, taking up a bigger share than weak credentials (27.2%) for the first time ever. Misconfigurations now take up 21%, and exposed interfaces 4.9%.

Article continues below

Changing tactics

The report also states that the hackers are exploiting these flaws much faster than ever before. Apparently, the window between vulnerability disclosure and exploitation shrunk from weeks to mere days, and in some cases, attackers were able to deploy cryptominers within 48 hours of the vulnerability becoming public.

Crooks are also abusing third-party integrations and SaaS relationships, Google said. Of all cloud intrusions tracked throughout 2025, a fifth (21%) involved compromised trusted third-party relationships.

“Akin to a SaaS supply chain compromise, UNC6395 leveraged compromised OAuth tokens associated with the Salesloft Drift application to conduct extensive discovery and bulk exfiltration of sensitive data from Salesforce tenants,” Google said.

“We also saw several intrusions involving theft and abuse of Salesforce Gainsight tokens to gain unauthorized access to victim environments.”

This is an important pivot. Misconfigured databases are generally seen as the biggest cause of data leaks, and if cloud storage providers improved identity protections and secure default configurations, and businesses learned a thing or two about securing their cloud infrastructure, it means the industry is moving in the right direction.

It also means attackers are increasingly targeting the weaker links around the cloud platform itself, such as third-party applications, developer tools, CI/CD pipelines, and SaaS integrations.

Best antivirus software header

The best antivirus for all budgets


Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.





Source link

Team TeachToday

Team TeachToday

About Author

TechToday Logo

Your go-to destination for the latest in tech, AI breakthroughs, industry trends, and expert insights.

Get Latest Updates and big deals

Our expertise, as well as our passion for web design, sets us apart from other agencies.

Digitally Interactive  Copyright 2022-25 All Rights Reserved.