Google's March 2026 Cloud Threat Horizons Report highlights a sharp acceleration in cloud attacks fueled by AI, with threat actors focusing on third-party software vulnerabilities that businesses struggle to patch quickly.

  • AI accelerates exploitation of software vulnerabilities from weeks to days
  • Third-party software unpatched flaws are prime targets for attackers
  • AI-assisted defenses are recommended to counter evolving threats

What happened

Google's recent Cloud Threat Horizons Report shows that cybercriminals and state-sponsored actors are using AI tools to significantly increase the speed and severity of attacks on cloud environments. The report covers incidents from the latter half of 2025, revealing that the typical window between public vulnerability disclosure and widespread exploitation has shrunk dramatically from weeks to just days.

Instead of focusing on the well-guarded core infrastructure of major cloud providers like Google Cloud, AWS, and Microsoft Azure, attackers have shifted to targeting unpatched vulnerabilities in popular third-party software. These include critical remote code execution flaws in widely used JavaScript libraries and platforms. One sophisticated attack involved a North Korean-backed group using AI-assisted methods to compromise Kubernetes workloads and steal millions in cryptocurrency.

Why it matters

The rapid exploitation cycle driven by AI tools presents a major challenge for businesses, many of which fail to deploy patches promptly, leaving critical gaps for attackers to exploit. This shift towards third-party software vulnerabilities highlights the growing insecurity of widely used development resources and open-source packages integrated into enterprise systems.

Furthermore, threat actors are increasingly targeting identity-related vulnerabilities rather than relying solely on brute force attacks on credentials. This broadens the attack surface, complicating traditional defense strategies. The report underscores that combatting these sophisticated AI-driven attacks requires adopting equally advanced, automated, AI-augmented defensive solutions to detect and respond to threats at machine speed.

What to watch next

Businesses need to prioritize swift patch management, especially for third-party software components, and invest in AI-powered automated security tools to stay ahead of attackers leveraging artificial intelligence. Security teams should also monitor identity-based attack methods with enhanced vigilance, including token theft and supply chain compromise tactics.

Industry observers will be watching how organizations adapt to the rapid evolution of cloud threats as AI continues to reshape the cybersecurity landscape. The effectiveness and adoption rate of AI-augmented defenses will likely determine which companies can withstand increasingly fast-moving and complex cloud attacks in 2026 and beyond.

Source assisted: This briefing began from a discovered source item from ZDNet. Open the original source.
How SignalDesk reports: feeds and outside sources are used for discovery. Public briefings are edited to add context, buyer relevance and attribution before they are published. Read the standards

Related briefings