Rising Cloud and Identity Threats: Insights from Red Canary

New Insights on Rising Cloud and Identity Threats
Red Canary has recently provided a significant update regarding the evolving landscape of cybersecurity threats. Their findings indicate a sharp rise in cloud and identity-based threats, highlighting critical vulnerabilities that businesses need to address.
Key Findings from the Latest Threat Detection Report
Cloud Account Detections Surging
Recent data indicates that detections of cloud accounts have skyrocketed by nearly 500% in the first half of 2025 compared to the entire preceding year. This surge is primarily fueled by enhanced detection capabilities specifically targeting identity-based threats.
Emergence of New Techniques
In a notable development, two innovative cloud threat techniques have made their way into Red Canary's top 10 techniques for the first time. These include 'Data from Cloud Storage' and 'Disable or Modify Cloud Firewall,' providing further evidence of the increasing complexity of threats that organizations face.
Understanding Phishing Tactics
Phishing attacks continue to pose a substantial risk, although analysis reveals that only 16% of reported phishing emails are deemed genuinely malicious. This statistic underscores the necessity for businesses to strengthen their ability to identify and respond to these threats proactively.
The Evolving Landscape of Cybersecurity
Adapting with Emerging Techniques
As cybercriminals adopt increasingly sophisticated methods, it’s crucial for businesses to adapt their strategies accordingly. For instance, the notorious threat actor group Scarlet Goldfinch has shifted tactics, moving away from fake browser updates to employing deceptive fake CAPTCHA techniques to lure victims.
Strategies for Enhanced Defense
To defend against these rising threats, organizations must consider implementing various strategic measures:
- Identity Security Controls: Enforce strong authentication methods, such as multi-factor authentication (MFA), to significantly reduce the risk of unauthorized access.
- Cloud Misconfiguration Management: Regularly audit cloud configurations to address security vulnerabilities and ensure compliance with best practices.
- Awareness Training: Provide comprehensive training for employees to improve their ability to recognize and respond to sophisticated phishing attempts and social engineering tactics.
- Monitoring Remote Access: Closely monitor the use of VPNs and remote management software to detect any suspicious activities.
Red Canary's Methodology
The insights shared in the Threat Detection Report are derived from extensive analysis of telemetry data collected from millions of endpoints and cloud infrastructures. This data provides a clear picture of the contemporary threat landscape, emphasizing the unique approach Red Canary takes in threat detection.
About Red Canary
Red Canary operates as a leading provider in the managed detection and response (MDR) sector. They serve a diverse spectrum of industries, aiming to detect and neutralize threats before they can inflict harm. With a vast network of clients, Red Canary remains committed to enhancing security across various digital environments.
About Zscaler
Zscaler (NASDAQ: ZS) is at the forefront of digital transformation, enabling businesses to operate more securely and efficiently in an increasingly connected world. Their platform fosters secure access to applications and data, significantly reducing the threat of cyberattacks.
Frequently Asked Questions
What were the key findings from Red Canary's report?
The report highlighted a 500% increase in cloud account detections, the emergence of new threat techniques, and the persistent risks associated with phishing.
How can organizations defend against emerging cybersecurity threats?
Organizations should enforce identity security controls, manage cloud configurations, conduct awareness training, and monitor remote access tools.
What is the significance of the findings on phishing emails?
Despite a low percentage of actual threats, phishing remains a critical attack vector, necessitating improved threat recognition capabilities.
Who is Red Canary?
Red Canary provides managed detection and response services to help organizations detect and neutralize cybersecurity threats effectively.
What does Zscaler offer?
Zscaler focuses on enabling secure digital transformation through its Zero Trust Exchange platform that protects against cyber threats.
About The Author
Contact Caleb Price privately here. Or send an email with ATTN: Caleb Price as the subject to contact@investorshangout.com.
About Investors Hangout
Investors Hangout is a leading online stock forum for financial discussion and learning, offering a wide range of free tools and resources. It draws in traders of all levels, who exchange market knowledge, investigate trading tactics, and keep an eye on industry developments in real time. Featuring financial articles, stock message boards, quotes, charts, company profiles, and live news updates. Through cooperative learning and a wealth of informational resources, it helps users from novices creating their first portfolios to experts honing their techniques. Join Investors Hangout today: https://investorshangout.com/
The content of this article is based on factual, publicly available information and does not represent legal, financial, or investment advice. Investors Hangout does not offer financial advice, and the author is not a licensed financial advisor. Consult a qualified advisor before making any financial or investment decisions based on this article. This article should not be considered advice to purchase, sell, or hold any securities or other investments. If any of the material provided here is inaccurate, please contact us for corrections.