Cloud Security Office Hours Banner

πŸ”¬ Cloud Threat Research

Primary sources for cloud-focused threat research β€” vendor research teams, annual threat reports, notable incident post-mortems, IOC feeds, threat intel platforms, and government advisories. Everything linked here is free to read.

Breach Kill Chains Latest News

About This Page

Threat research is how the cloud security community learns from real attacks. This page collects the research teams, reports, feeds, and frameworks that cloud defenders actually read. Where possible, we link directly to the research output (a blog, a feed URL, or a report) rather than a vendor marketing page.

Spot something missing? Submit a PR on GitHub or email admin@csoh.org.

🧠 Vendor Research Teams

Teams that publish original cloud-focused threat research, detection logic, and attacker TTPs.

Wiz Research

Cloud-native vulnerability research β€” tenant isolation failures, shared-responsibility gaps, and novel CSP bugs (e.g. ChaosDB, ExtraReplica, OMIGOD).

Research Multi-Cloud Vulnerabilities

Unit 42 (Palo Alto Networks)

Threat intelligence on ransomware, APTs, cloud attack trends, and the annual Unit 42 Cloud Threat Report.

Threat Intel APT Ransomware

Mandiant / Google Cloud Threat Intel

Incident response telemetry, nation-state tracking (UNC/APT groups), and the annual M-Trends report.

Threat Intel APT GCP

Microsoft Threat Intelligence

Tracks actors like Storm-0558, Midnight Blizzard, and Octo Tempest β€” with deep Azure/Entra ID attack detail.

Threat Intel Azure Entra ID

Google Threat Analysis Group (TAG)

Nation-state actor tracking, 0-day exploitation analysis, and coordinated disclosure research.

Threat Intel Nation-State 0-day

CrowdStrike Counter Adversary Ops

Adversary tracking (Scattered Spider, Cozy Bear, etc.), breakout-time stats, and the annual Global Threat Report.

Threat Intel Adversary Tracking

SentinelLabs

In-depth malware reverse engineering and cloud intrusion analysis (e.g. LABRAT cryptojacking, Scarleteel).

Malware Analysis Reverse Engineering

Datadog Security Labs

Cloud detection engineering research, attack path analysis, and the annual State of Cloud Security report.

Detection Engineering AWS Multi-Cloud

Sysdig Threat Research (TRT)

Container and Kubernetes attack research β€” cryptojacking operations, runtime exploits, and supply-chain threats.

Containers Kubernetes Runtime

Aqua Nautilus

Cloud-native threat research focused on container registries, package repositories, and CI/CD supply chain attacks.

Containers Supply Chain

Permiso Security

Identity-centric cloud threat research: LUCR-3 (Scattered Spider), AWS privilege escalation, and IdP abuse.

Identity AWS

Cado Security Labs

Cloud incident response and forensics research β€” covers novel malware families targeting AWS, Azure, and GCP.

Incident Response Forensics

Google Cloud Security Blog

Product security research and detection content from Google Cloud, Chronicle, and BeyondCorp.

GCP Detection Engineering

AWS Security Bulletins

Official AWS advisories for vulnerabilities affecting AWS services, open-source projects, and shared infrastructure.

AWS Advisories

Microsoft Security Response Center

MSRC advisories and vulnerability disclosure posts for Microsoft cloud, OS, and identity products.

Azure Advisories

IBM X-Force

Threat intelligence research and the annual X-Force Threat Intelligence Index with cloud attack trend data.

Threat Intel Reports

Trellix Advanced Research Center

Threat actor profiles, ransomware tracking, and vulnerability research from the former McAfee/FireEye labs.

Threat Intel Ransomware

Proofpoint Threat Insight

Research into phishing, BEC, and cloud account takeover campaigns β€” primary source for SaaS/M365 threats.

Phishing SaaS

πŸ“Š Annual Threat Reports

The reports that drive the yearly cloud-security conversation. Most are free but require a form submission.

Mandiant M-Trends

Annual analysis of attacker behavior from Mandiant's incident response engagements β€” includes dwell time stats and cloud-specific TTPs.

Report IR

CrowdStrike Global Threat Report

Cloud intrusion growth rates, eCrime & nation-state actor profiles, and breakout-time benchmarks.

Report Adversary Tracking

Unit 42 Cloud Threat Report

Dedicated to cloud posture and attack data from Palo Alto telemetry β€” config drift, exposed credentials, and misconfigurations.

Report Cloud Posture

Verizon DBIR

The industry-standard Data Breach Investigations Report β€” thousands of incidents analyzed, with growing cloud coverage.

Report Breaches

IBM X-Force Threat Intelligence Index

Annual trends on initial access vectors, top attacked industries, and cloud credential abuse.

Report Threat Intel

Datadog State of Cloud Security

Real-world cloud posture data β€” IMDSv2 adoption, long-lived credentials, and public storage exposure across thousands of accounts.

Report Cloud Posture

CSA Top Threats to Cloud Computing

Cloud Security Alliance's ranked list of cloud threats, updated periodically with real incident case studies (the "Pandemic Eleven").

Report Framework

ENISA Threat Landscape

European Union's annual threat landscape report β€” a useful non-US perspective on cloud, supply chain, and ransomware trends.

Report EU

Sophos State of Ransomware

Annual survey of ransomware victims β€” includes ransom payment rates, recovery costs, and attack entry points.

Report Ransomware

πŸ’₯ Notable Cloud Incidents & Post-Mortems

Real attacks with detailed public write-ups. Start with our own step-by-step breach kill chains, then dig into primary sources.

🧭 CSOH Breach Kill Chains

Our in-house collection: Capital One, Storm-0558, SolarWinds, LastPass, MGM, Snowflake β€” all mapped to MITRE ATT&CK Cloud.

CSOH Original MITRE Mapped

Capital One (2019)

SSRF β†’ IMDSv1 β†’ over-privileged IAM role β†’ 106M records exfiltrated from S3. The case that made AWS ship IMDSv2.

AWS SSRF IAM

Storm-0558 (2023)

Microsoft's own post-mortem on how a stolen consumer signing key was used to forge tokens for enterprise Exchange Online accounts.

Azure Token Forgery

SolarWinds / SUNBURST (2020)

Supply-chain compromise that pivoted to Azure AD / M365 via Golden SAML. CISA's remediation guide is the canonical reference.

Supply Chain Azure AD

LastPass (2022–23)

Home-PC Plex exploit β†’ keylogger β†’ master password β†’ AWS S3 customer vault exfiltration. 33M customers affected.

AWS S3 Credential Theft

Scattered Spider / MGM (2023)

CISA joint advisory covering Scattered Spider (Octo Tempest, UNC3944) tradecraft β€” help-desk social engineering, Okta abuse, Azure pivot.

Social Eng Okta Azure

Snowflake / UNC5537 (2024)

Infostealer-harvested credentials used against Snowflake tenants without MFA β€” impacted 165+ organizations.

Snowflake Infostealer

Uber (2022)

Contractor MFA fatigue β†’ PAM vault credentials β†’ domain admin, AWS, GCP, Slack. Uber's own disclosure.

MFA Fatigue Multi-Cloud

Microsoft AI SAS Token Leak (2023)

38TB of internal data exposed via an overprivileged, long-lived Azure SAS token on a public GitHub repo. Discovered by Wiz.

Azure SAS Token

Codecov (2021)

Docker image credential compromise leading to bash uploader tampering β€” a supply-chain attack that exposed customer CI secrets.

Supply Chain CI/CD

Okta Support System (2023)

Okta's own post-mortem on the HAR-file compromise affecting 100% of customer support tickets.

Identity SaaS

CISA Cybersecurity Advisories

US government post-incident advisories (AA-series) β€” the most detailed public documentation of major ongoing campaigns.

CISA Advisories

🎯 IOC Feeds & Threat Intel Platforms

Indicators, hashes, C2 infrastructure, and enrichment sources. Most are free; some offer higher-volume paid tiers.

AlienVault OTX

Open Threat Exchange β€” community-contributed IOC "pulses" with IPs, hashes, domains, and CVEs. Free API.

IOCs Community Free API

abuse.ch (URLhaus, ThreatFox, MalwareBazaar)

High-signal feeds for malicious URLs, malware samples, and C2 infrastructure. Free non-commercial use.

IOCs Malware C2

VirusTotal

File, URL, IP, and domain reputation β€” the industry's default triage tool. VT Intelligence for hunting requires a paid plan.

Enrichment Malware

MISP

Open-source threat intelligence platform used by CERTs and enterprises for sharing, correlating, and storing IOCs.

Platform Open Source

Shodan

Search engine for internet-exposed services β€” find your own exposed S3, RDS, Kubernetes API servers before attackers do.

Recon Enrichment

GreyNoise

Tells you whether an IP is part of internet-wide scan noise or targeted activity β€” cuts false positives on scan-based detections.

Enrichment Scan Data

Censys Search

Internet scanning and attack-surface search β€” track adversary infrastructure (Cobalt Strike beacons, phishing kits) across the IPv4 space.

Recon Attack Surface

CIRCL.lu

Luxembourg CERT β€” hosts public passive DNS, pDNS, SSL cert history, and hashlookup services for free.

Enrichment Passive DNS

Feodo Tracker

Live feed of botnet C2 IPs (Emotet, Dridex, TrickBot, IcedID) β€” perfect for blocklist automation.

C2 Blocklist

Spamhaus

Long-running IP/domain reputation feeds β€” SBL, XBL, PBL, and the Botnet Controller List (BCL) are widely used at perimeters.

Reputation Blocklist

IBM X-Force Exchange

Collaborative threat intelligence platform for IOC enrichment and sharing. Free tier includes API access.

Enrichment IOCs

OSINT Framework

Tree of open-source intelligence resources β€” useful when pivoting from an IOC to actor attribution.

OSINT Directory

πŸ—ΊοΈ Attack Frameworks & Matrices

The taxonomies you'll see referenced in every serious threat report. Learn the matrices, then use them to structure your own hunts and detections.

πŸ›οΈ Government & Regulatory Advisories

Authoritative sources from CISA, NCSC, NSA, FBI, and peers β€” usually the first public detail on active nation-state campaigns.

🀝 Help Us Keep This Current

Threat research moves fast and this page will go stale if the community doesn't help. Know a team, report, or feed we should add? Noticed a broken link?

πŸ“ Submit a PR

Edit threat-research.html on GitHub and open a pull request β€” the fastest way to get a new source listed.

Open GitHub

βœ‰οΈ Email a Suggestion

Not comfortable with GitHub? Email us with the source URL and a one-line description.

Email admin@csoh.org

🎀 Present Your Research

Got original threat research to share? Come present it on a Friday Zoom session.

Friday Zoom Sessions