Link Centre - Search Engine and Internet Directory

Helping to share the web since 1996

Google Warns: AI Is Supercharging Cyberattacks in the Cloud

It’s still unclear whether most companies are seeing clear returns from investing in AI - but one group is definitely benefiting: cybercriminals.

a laptop and a computer

A recent report from Google highlights how attackers are using AI to accelerate and scale their operations, especially in cloud environments where businesses are most exposed. One of the most alarming findings is how quickly threats now move - what once took weeks to exploit after a vulnerability was disclosed now happens in just a few days.

Faster, smarter attacks

Instead of targeting heavily protected platforms like Amazon Web Services or Microsoft Azure directly, attackers are increasingly going after weaker entry points - such as outdated or unpatched third-party software.

For example, vulnerabilities in widely used tools like React components or the XWiki platform were exploited within days of being revealed, often before organizations had time to apply fixes. In some cases, attackers used compromised code packages to steal credentials, access cloud storage, and even delete data - all within a matter of hours.

Social engineering and identity attacks rise

The report also shows a shift in tactics. Rather than brute-forcing passwords, attackers are focusing on identity-based attacks, including:

  • Voice scams (vishing)
  • Email phishing
  • Exploiting trusted third-party relationships
  • Using stolen credentials (both human and machine identities)
  • Taking advantage of misconfigured systems

There’s also a growing risk from insiders - employees or contractors who intentionally or unintentionally leak sensitive data using platforms like Google Drive, Dropbox, or Microsoft OneDrive.

Silent and prolonged breaches

Another concerning trend is that many attacks now go unnoticed for extended periods. Nearly half of the incidents studied involved data theft without immediate ransom demands, meaning attackers stayed hidden while quietly extracting valuable information.

How businesses can respond

The report suggests that defending against AI-driven threats requires equally advanced, automated security measures. Key steps include:

  • Keeping all software - especially third-party tools - fully updated
  • Strengthening access controls with multi-factor authentication
  • Monitoring networks for unusual activity
  • Preparing a clear incident response plan in advance

For smaller businesses without in-house expertise, partnering with a managed security provider can be critical.

The bigger picture

AI is reshaping cybersecurity on both sides. While companies are still figuring out how to benefit from it, attackers are already using it to move faster, stay hidden longer, and exploit weaknesses more efficiently - making proactive defense more important than ever.

Newer Articles

Older Articles

← Back to News Headlines