Home / Companies / Datadog / Blog / Post Details
Content Deep Dive

2025 cloud security roundup: How attackers abused identities, supply chains, and AI

Blog post from Datadog

Post Details
Company
Date Published
Author
Mallory Mooney
Word Count
1,175
Language
English
Hacker News Points
-
Summary

In 2025, the cloud security landscape faced enduring concerns alongside emerging challenges, primarily driven by increased AI adoption and evolving attacker strategies. The rapid integration of AI technologies introduced new vulnerabilities due to unpredictable user input and nascent security models, while persistent issues like long-lived credentials and third-party package vulnerabilities continued to threaten cloud environments. Attackers increasingly targeted identities, development pipelines, and AI tools, exploiting security gaps within shifting cloud perimeters defined by data rather than networks. Notably, there was a marked focus on supply chain attacks, particularly within developer environments and CI/CD pipelines, exemplified by incidents like the npm worm attack. Organizations were encouraged to enhance their monitoring systems, integrate security with incident management, and fortify defenses by minimizing credential lifespans, securing AI systems, and protecting supply chain components to mitigate these evolving threats.