Red Canary Reveals Surge in Cloud and Identity Threats, Urging Organizations to Pivot Cybersecurity Strategies
ByAinvest
Wednesday, Aug 6, 2025 12:42 pm ET1min read
ZS--
The report, released by Red Canary, a Zscaler company, highlights two new cloud techniques that have entered the top 10 detected threats: Data from Cloud Storage and Disable or Modify Cloud Firewall [1]. These emerging risks underscore the need for organizations to focus on cloud security, rather than traditional endpoint protection.
The report also notes that while phishing emails remain prevalent, only 16% of suspected phishing emails were genuinely malicious [1]. However, the sophistication of these phishing attempts has evolved, with attackers employing techniques like using Google Translate to bypass security measures [1].
To counter these evolving threats, Red Canary recommends several strategies. Enforcing multi-factor authentication (MFA) and conditional access policies (CAP) can reduce unauthorized identity usage. Regular audits of cloud infrastructure configurations are crucial to prevent misconfigurations that could expose organizations to significant risks. Additionally, enhancing user training to identify sophisticated phishing attempts and closely monitoring VPN and remote management tool usage can significantly improve an organization's cybersecurity posture [1].
The report's findings underscore the need for organizations to adopt a more comprehensive approach to security, moving away from traditional endpoint-focused strategies and towards integrated cloud security platforms [1]. This shift is particularly important as threat actors increasingly leverage AI and diversify their techniques and tooling [3].
References:
[1] https://www.stocktitan.net/news/ZS/red-canary-research-reveals-sharp-rise-in-cloud-and-identity-threats-5utqqujjfzbl.html
[2] https://www.nasdaq.com/press-release/red-canary-research-reveals-sharp-rise-cloud-and-identity-threats-exposing-critical
[3] https://www.darktrace.com/blog/2025-cyber-threat-landscape-darktraces-mid-year-review
Red Canary's midyear 2025 Threat Detection Report reveals a 500% surge in Cloud Account detections, highlighting the need for organizations to pivot towards identity and cloud-based threats. The report also notes a rise in new cloud techniques and a low percentage of truly malicious phishing emails, with attackers employing sophisticated methods to bypass security systems. To counter these evolving threats, Red Canary recommends enforcing multi-factor authentication, conducting regular cloud infrastructure audits, enhancing user training, and closely monitoring VPN and remote management tool usage.
Red Canary's midyear 2025 Threat Detection Report reveals a significant shift in the cybersecurity landscape, with a 500% surge in Cloud Account detections [1]. This dramatic increase underscores the growing importance of identity and cloud-based threats, prompting organizations to reassess their security strategies.The report, released by Red Canary, a Zscaler company, highlights two new cloud techniques that have entered the top 10 detected threats: Data from Cloud Storage and Disable or Modify Cloud Firewall [1]. These emerging risks underscore the need for organizations to focus on cloud security, rather than traditional endpoint protection.
The report also notes that while phishing emails remain prevalent, only 16% of suspected phishing emails were genuinely malicious [1]. However, the sophistication of these phishing attempts has evolved, with attackers employing techniques like using Google Translate to bypass security measures [1].
To counter these evolving threats, Red Canary recommends several strategies. Enforcing multi-factor authentication (MFA) and conditional access policies (CAP) can reduce unauthorized identity usage. Regular audits of cloud infrastructure configurations are crucial to prevent misconfigurations that could expose organizations to significant risks. Additionally, enhancing user training to identify sophisticated phishing attempts and closely monitoring VPN and remote management tool usage can significantly improve an organization's cybersecurity posture [1].
The report's findings underscore the need for organizations to adopt a more comprehensive approach to security, moving away from traditional endpoint-focused strategies and towards integrated cloud security platforms [1]. This shift is particularly important as threat actors increasingly leverage AI and diversify their techniques and tooling [3].
References:
[1] https://www.stocktitan.net/news/ZS/red-canary-research-reveals-sharp-rise-in-cloud-and-identity-threats-5utqqujjfzbl.html
[2] https://www.nasdaq.com/press-release/red-canary-research-reveals-sharp-rise-cloud-and-identity-threats-exposing-critical
[3] https://www.darktrace.com/blog/2025-cyber-threat-landscape-darktraces-mid-year-review

Stay ahead of the market.
Get curated U.S. market news, insights and key dates delivered to your inbox.
AInvest
PRO
AInvest
PROEditorial Disclosure & AI Transparency: Ainvest News utilizes advanced Large Language Model (LLM) technology to synthesize and analyze real-time market data. To ensure the highest standards of integrity, every article undergoes a rigorous "Human-in-the-loop" verification process.
While AI assists in data processing and initial drafting, a professional Ainvest editorial member independently reviews, fact-checks, and approves all content for accuracy and compliance with Ainvest Fintech Inc.’s editorial standards. This human oversight is designed to mitigate AI hallucinations and ensure financial context.
Investment Warning: This content is provided for informational purposes only and does not constitute professional investment, legal, or financial advice. Markets involve inherent risks. Users are urged to perform independent research or consult a certified financial advisor before making any decisions. Ainvest Fintech Inc. disclaims all liability for actions taken based on this information. Found an error?Report an Issue

Comments
No comments yet