Security News Google: Cloud attacks exploit flaws more than weak credentials

Divergent

Level 26
Thread author
Verified
Jul 26, 2025
1,478
4,820
2,468
Hackers are increasingly exploiting newly disclosed vulnerabilities in third-party software to gain initial access to cloud environments, with the window for attacks shrinking from weeks to just days.

At the same time, the use of weak credentials or misconfigurations has dropped significantly in the second half of 2025, Google notes in a report highlighting the trends on threats to cloud users.

According to the report, incident responders determined that bug exploits were the primary access vector in 44.5% of the investigated intrusions, while credentials were responsible for 27% of the breaches.

 
According to Google’s latest threat report, vulnerability exploitation was the main initial access method in 44.5% of cloud intrusions investigated in the second half of 2025. Compromised credentials made up 27% of cases. Google says this shift likely reflects stronger account protections and secure-by-default measures that are making credential-based attacks less effective.