Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Identity Is Now the Top Source of Cloud Risk
Cyber Security

Identity Is Now the Top Source of Cloud Risk

Team-CWDBy Team-CWDNovember 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Identity failings and legacy vulnerabilities are driving a surge in cloud attacks, a new report from ReliaQuest has warned.

The threat intelligence specialist claimed that 44% of true-positive alerts it recorded in the third quarter of 2025 were traced back to “identity-related weakness.” These included excessive permissions, misconfigured roles and credential abuse.

The reason threat actors are targeting the identity layer is simple: cloud keys and credentials often make their way onto cybercrime markets because they’re stored insecurely, putting them at risk of phishing or infostealer malware. Attackers can buy legitimate credentials on the dark web for as little as $2, according to the report.

Cloud credentials also usually have excessive permissions assigned to them, enabling attackers to escalate access. ReliaQuest claimed that 99% of cloud identities are over-privileged.

This means that threat actors can simply log in as legitimate users and achieve their goals, without setting off any internal alarms. Given that the average organization manages thousands of identities across AWS, Azure, Google Cloud and SaaS applications, the attack surface is potentially huge.

Read more on identity threats: New ‘LLMjacking’ Attack Exploits Stolen Cloud Credentials

ReliaQuest also highlighted the security risks created by poor DevOps practices, which in some cases can lead to the “systematic redeployment” of legacy vulnerabilities in new software.

“The cloud’s greatest strength – on-demand infrastructure deployments – is also a source of systemic risk. In the race for speed, along with unclear ownership of risk remediation, organizations often unknowingly perpetuate vulnerabilities,” the report explained.

“Every automated deployment of a new server, container, or serverless function can replicate a single flaw from an old template across the environment in minutes. As this cycle repeats daily, new assets are created faster than security teams can manually scan and address them.”

ReliaQuest claimed that 71% of critical vulnerability alerts it managed during the quarter stemmed from just four CVEs, dating back to 2021.

“The result is an ever-expanding attack surface and an unmanageable vulnerability backlog,” it warned.

What Must Happen Next

The report urged organizations to improve their posture in order to mitigate these risks, by:

  • Eliminating static AWS keys for humans, and instead using short-term credentials generated via the AWS Security Token Service (STS)
  • Enforcing least privilege policies to reduce the risk of privilege escalation. This can be done via cloud infrastructure entitlement management (CIEM) tools like AWS IAM Access Analyzer, GCP IAM Recommender and Microsoft Entra Permissions Management
  • Automating security checks in CI/CD pipelines, such as via static analysis tools, to prevent vulnerabilities and misconfigurations reaching production



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFrench Police Seize €1.6m Amid Crypto Scam Network Crackdown
Next Article Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Don’t let “back to school” become “back to bullying”

September 11, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.