Google Cloud Security Threat Horizons Report #13 (H1 2026) Is Out!
This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our next Cloud Threat Horizons Report, #13 (full version, no info to enter!) that we just released (the official blog for #1 report, my unofficial blogs for #2, #3, #4, #5, #6, #7, #8, #9, #10, #11 andΒ #12).
My favorite quotes from the report followΒ below:
- [in Google Cloud] βsoftware exploitation overtook credentials as the primary initial access vector for the first time.β and βThreat actors exploited third-party software-based entry (44.5%) more frequently than weak credentials.β [A.C.βββsome of you may say this is because AI is making more zero days, but a dozen more mundane answers may be correctΒ instead]

- βWhile threat actors continued to use brute-force attacks against weak credentials, the increase in RCE represents a pivot toward more automated exploitation of unpatched application-layer vulnerabilities.β [A.C.βββto some extent βcreds or vulnsβ debate is rather pointless as the real answer is βbothβ, and it varies by environment too, seeΒ below]
- βThreat actors continued to transition from traditional phishing to voice-based social engineering (vishing), and credential harvesting from third-party SaaS tokens to facilitate large-scale, silent data exfiltration.β [A.C.βββagain, this means βANDβ not βORβ because classic phishing still works well in many cases, but yes βcredential harvesting from third-party SaaSβ has become very fruitfulΒ too]
- [overall] Still βIdentity compromise underpinned 83% of compromises. [A.C.βββso, yes, βcredsβ still beat βvulnsβ on many environments]

- βHigh-volume data theft operationsβββexecuted through compromised but legitimate access channelsβββremained the primary goal for threat actors, with our metrics showing they targeted data in 73% of cloud-related incidents.β [A.C.βββagain, not new, but very useful data confirming the running trend.Β Beware!]
- βThe window between vulnerability disclosure and mass exploitation collapsed by an order of magnitude, from weeks to days.β [A.C.βββagain, some of you may see the invisible robot hand of an AI here, but, as usual, the reality is more complicatedβ¦]
- βTrend analysis from 2008β2025 indicates cloud services will soon surpass email as the primary data exfiltration pathway.β [A.C.βββ$32B reasons to finally get serious about it across allΒ clouds?]
- β45% of intrusions resulted in data theft without immediate extortion attempts at the time of the engagement, and these were often characterized by prolonged dwell times and stealthy persistence.β
- βThe traditional incident response model is no longer viable when dealing with containerized workloads and serverless architectures where data can vanish in seconds.β [A.C.βββa very useful reminder here! Cloud is cloudy! Donβt be that guy who thinks that cloud is a rented colo. Cloud is not JUST somebody elseβs computer.]
- βThreat actors used large language models (LLM) to automate credential harvesting and transition from a developerβs local environment to full cloud administration access.β [A.C.βββthis really should not be news for anybody in 2026, but if it is, HERE IS SOME NEWS: BAD GUYS USEΒ AI!]
- Thus βPrevent LLM exploitation as an extension of living-off-the-land (LOTL) by treating LLM activity with the same scrutiny as administrative command-line tools.β [A.C.βββor, as I say, βwith AI agents, every prompt injection is anΒ RCEβ]
Now, go and read the CTHR 13Β report!
Related posts:
- Google Cloud Security Threat Horizons Report #12 IsΒ Out!
- EP112 Threat HorizonsβββHow Google Does Threat Intelligence podcast
- Google Cloud Security Threat Horizons Report #11 IsΒ Out!
- Google Cloud Security Threat Horizons Report #10 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #9 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #8 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #7 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #6 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #5 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #4 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #3 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #2 IsΒ Out!
- Illicit coin mining, ransomware, APTs target cloud users in firstΒ Google
- Cybersecurity Action Team Threat HorizonsΒ report
Google Cloud Security Threat Horizons Report #13 (H1 2026) Is Out! was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.





