Misconfigurations‎
Breach of Data‎
Malware/Ransomware‎
Advanced Persistent Threats (APTs)
Compromises in the Supply Chain‎
‎Inadequate Identities and Credentials‎
‎‎Poor Access Management‎
‎‎‎Insecure APIs and interfaces‎ ‎
‎‎Unsuitable Use or Abuse of Cloud Services‎
‎‎ ‎Shared Services and Technology Issues‎
Cloud Pentesting