Updated October 2024 This research builds on the previous edition of this article, which was published in November 2023. You can click here to download the graphs for each fact. Attackers have continued to adapt their techniques to an increasingly cloud-native landscape, with new threats targeting the different cloud platforms constantly emerging. As threats evolve, understanding the major sources