<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cloud_security — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cloud_security/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 29 Mar 2026 07:29:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cloud_security/feed.xml" rel="self" type="application/rss+xml"/><item><title>CrowdStrike CNAPP Enhanced with Adversary-Informed Risk Prioritization</title><link>https://feed.craftedsignal.io/briefs/2026-05-cnapp-adversary-risk/</link><pubDate>Sun, 29 Mar 2026 07:29:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cnapp-adversary-risk/</guid><description>CrowdStrike enhances its CNAPP capabilities by incorporating adversary intelligence for risk prioritization, application-layer visibility, and runtime analysis, addressing critical gaps in cloud security and enabling faster remediation based on threat actor behavior like LABYRINTH CHOLLIMA and SCATTERED SPIDER.</description><content:encoded><![CDATA[<p>CrowdStrike has advanced its Cloud Native Application Protection Platform (CNAPP) by introducing new capabilities designed to provide security teams with improved context and prioritization for cloud risks. The enhanced CNAPP incorporates Application Explorer for application-layer visibility, allowing a unified view of applications running across cloud and on-premises environments. A key feature is the integration of adversary intelligence, which maps cloud risks to known threat actor profiles, such as LABYRINTH CHOLLIMA and SCATTERED SPIDER, enabling risk prioritization based on observed attacker behavior and targeted industries. These advancements aim to close security gaps and reduce breach risks, addressing the rise in cloud intrusions, which surged 266% year-over-year in 2025, as highlighted in the CrowdStrike 2026 Global Threat Report. The CNAPP enhancements also include runtime analysis to understand how applications interact with infrastructure, improving the ability to remediate issues effectively.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise (Cloud Misconfiguration):</strong> An organization&rsquo;s cloud environment contains misconfigured storage resources with overly permissive access. This is often a result of configuration drift or human error.</li>
<li><strong>Discovery (Application Inventory):</strong> An attacker identifies the organization uses cloud-based infrastructure, and begins reconnaissance to determine publicly accessible services and data stores. They use publicly available cloud enumeration tools.</li>
<li><strong>Privilege Escalation (Exploit Weak IAM):</strong> The attacker exploits weak Identity and Access Management (IAM) policies to gain access to a service account with broad permissions.</li>
<li><strong>Lateral Movement (Application Dependency Mapping):</strong> The attacker identifies business-critical applications connected to the storage resource using application dependency mapping and runtime analysis.</li>
<li><strong>Data Access (PII Exposure):</strong> The attacker accesses the compromised storage resource containing customer Personally Identifiable Information (PII) because the application processes sensitive data.</li>
<li><strong>Exfiltration (Data Theft):</strong> The attacker exfiltrates the sensitive data to an external controlled server, leveraging the compromised service account.</li>
<li><strong>Impact (Data Breach):</strong> The organization experiences a data breach, resulting in financial losses, reputational damage, and regulatory fines due to the exposed PII.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of cloud misconfigurations and vulnerabilities can lead to significant data breaches, resulting in financial losses, reputational damage, and regulatory penalties. The 2026 Global Threat Report indicates a 266% surge in cloud intrusions by state-nexus threat actors in 2025, highlighting the increasing risk and potential for widespread impact across various sectors. Organizations operating in targeted industries, such as financial services (a known target of groups like LABYRINTH CHOLLIMA), face a higher likelihood of being compromised. The compromise of AI-driven applications can expose sensitive data to external AI services, further exacerbating the impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Cloud Account with Excessive Permissions&rdquo; to identify accounts with overly permissive access as described in the attack chain (related to Initial Compromise).</li>
<li>Leverage CrowdStrike&rsquo;s adversary intelligence to prioritize cloud risks associated with threat actors like LABYRINTH CHOLLIMA and SCATTERED SPIDER (Adversary Intelligence for Cloud Risks).</li>
<li>Utilize Application Explorer to gain visibility into application dependencies and identify business-critical applications connected to cloud resources to focus remediation efforts effectively (Application Explorer).</li>
<li>Monitor cloud environments for suspicious activity using cloud-native logging and alerting mechanisms to detect lateral movement and data exfiltration attempts (Attack Chain steps 3-6).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cloud_security</category><category>cnapp</category><category>threat_intelligence</category></item></channel></rss>