{"data":{"id":"298a1dd6-bada-4df6-bf32-8443936db310","title":"12 ways attackers abuse cloud services to hack your enterprise","summary":"Attackers are increasingly using legitimate cloud services and APIs (application programming interfaces, which allow different software to communicate) to hide malicious activity and command-and-control (C2, systems that attackers use to remotely control compromised computers) operations. Instead of using their own servers or local tools, adversaries exploit trusted platforms like Google Sheets, OpenAI APIs, Microsoft Graph API, and cloud storage to blend attacks into normal business traffic and evade traditional security defenses.","solution":"N/A -- no mitigation discussed in source.","labels":["security"],"sourceUrl":"https://www.csoonline.com/article/4142001/12-ways-attackers-abuse-cloud-services-to-hack-your-enterprise.html","publishedAt":"2026-03-11T07:00:00.000Z","cveId":null,"cweIds":null,"cvssScore":null,"cvssSeverity":null,"severity":"medium","attackType":["supply_chain"],"issueType":"news","affectedPackages":null,"affectedVendors":["OpenAI","Microsoft","Amazon","Google"],"affectedVendorsRaw":["OpenAI","AWS","Azure","Google Cloud","Microsoft Graph API","Microsoft SharePoint","OneDrive"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":null,"epssScore":null,"patchAvailable":null,"disclosureDate":"2026-03-11T07:00:00.000Z","capecIds":null,"crossRefCount":0,"attackSophistication":"moderate","impactType":["confidentiality","integrity"],"aiComponentTargeted":"api","llmSpecific":false,"classifierConfidence":0.85,"researchCategory":null,"atlasIds":null}}