A recent report from Google highlights how attackers are using AI to accelerate and scale their operations, especially in cloud environments where businesses are most exposed. One of the most alarming findings is how quickly threats now move - what once took weeks to exploit after a vulnerability was disclosed now happens in just a few days.
Faster, smarter attacks
Instead of targeting heavily protected platforms like Amazon Web Services or Microsoft Azure directly, attackers are increasingly going after weaker entry points - such as outdated or unpatched third-party software.
For example, vulnerabilities in widely used tools like React components or the XWiki platform were exploited within days of being revealed, often before organizations had time to apply fixes. In some cases, attackers used compromised code packages to steal credentials, access cloud storage, and even delete data - all within a matter of hours.
Social engineering and identity attacks rise
The report also shows a shift in tactics. Rather than brute-forcing passwords, attackers are focusing on identity-based attacks, including:
- Voice scams (vishing)
- Email phishing
- Exploiting trusted third-party relationships
- Using stolen credentials (both human and machine identities)
- Taking advantage of misconfigured systems
There’s also a growing risk from insiders - employees or contractors who intentionally or unintentionally leak sensitive data using platforms like Google Drive, Dropbox, or Microsoft OneDrive.
Silent and prolonged breaches
Another concerning trend is that many attacks now go unnoticed for extended periods. Nearly half of the incidents studied involved data theft without immediate ransom demands, meaning attackers stayed hidden while quietly extracting valuable information.
How businesses can respond
The report suggests that defending against AI-driven threats requires equally advanced, automated security measures. Key steps include:
- Keeping all software - especially third-party tools - fully updated
- Strengthening access controls with multi-factor authentication
- Monitoring networks for unusual activity
- Preparing a clear incident response plan in advance
For smaller businesses without in-house expertise, partnering with a managed security provider can be critical.
The bigger picture
AI is reshaping cybersecurity on both sides. While companies are still figuring out how to benefit from it, attackers are already using it to move faster, stay hidden longer, and exploit weaknesses more efficiently - making proactive defense more important than ever.