2025 cloud security roundup: How attackers abused identities, supply chains, and AI
Blog post from Datadog
In 2025, the cloud security landscape faced enduring concerns alongside emerging challenges, primarily driven by increased AI adoption and evolving attacker strategies. The rapid integration of AI technologies introduced new vulnerabilities due to unpredictable user input and nascent security models, while persistent issues like long-lived credentials and third-party package vulnerabilities continued to threaten cloud environments. Attackers increasingly targeted identities, development pipelines, and AI tools, exploiting security gaps within shifting cloud perimeters defined by data rather than networks. Notably, there was a marked focus on supply chain attacks, particularly within developer environments and CI/CD pipelines, exemplified by incidents like the npm worm attack. Organizations were encouraged to enhance their monitoring systems, integrate security with incident management, and fortify defenses by minimizing credential lifespans, securing AI systems, and protecting supply chain components to mitigate these evolving threats.