Rising AI-Driven Cybersecurity Threats Target Business Cloud and Virtual Environments

AI-driven cyberattacks targeting business cloud and virtual environments are surging, urging companies to consolidate security tools and enforce stricter protection measures.

    Key details

  • • 99% of security professionals reported attacks on AI systems in the past year.
  • • API attacks increased by 41%, exposing weaknesses in IAM practices.
  • • Warp Panda used Brickstorm malware to maintain persistent access to VMware environments.
  • • Fragmented security tools complicate effective incident response; 97% advocate tool consolidation.
  • • Strict access controls and network segmentation recommended to protect cloud and virtual systems.

German businesses face escalating cybersecurity challenges as AI-driven attacks increasingly target cloud infrastructures and virtual environments. According to a report by Palo Alto Networks, nearly all surveyed security professionals (99%) experienced at least one attack on their AI systems over the past year, highlighting a significant surge in risks. API attacks alone have risen by 41%, and 53% of respondents pointed to inadequate Identity and Access Management (IAM) practices as a critical vulnerability facilitating credential theft and data breaches.

The report underscores the need to consolidate cloud security tools, as companies currently manage an average of 17 tools from five different vendors, leading to fragmented and inefficient incident response. An overwhelming 97% of security experts advocate for integrating these tools and fully incorporating cloud and application security into Security Operations Centers (SOC) to enhance effectiveness.

Separately, CrowdStrike revealed targeted attacks on VMware vCenter and ESXi environments by the sophisticated threat group Warp Panda in 2025. Using malware such as Brickstorm and techniques like JSP web shells and implants named Junction and GuestConduit, Warp Panda maintains persistent and stealthy access to victims’ networks. The group exploits internet-facing edge devices, often via valid credentials or vulnerabilities, and moves laterally within networks using SSH and privileged accounts. They exfiltrate sensitive data, including Microsoft 365 content stored on OneDrive and SharePoint.

CrowdStrike recommends multi-layered defense strategies, including strict access controls, network segmentation, continuous monitoring of unauthorized activities, and SSH access restrictions to protect virtual environments.

The evolving cybersecurity landscape demands integrated, proactive approaches combining risk mitigation with rapid incident response. As static visibility and isolated measures fall short, enterprises must adopt comprehensive platforms like Palo Alto Networks’ Cortex Cloud to secure their cloud ecosystems and guard against increasingly sophisticated AI-enabled threats.

This article was synthesized and translated from native language sources to provide English-speaking readers with local perspectives.

The top news stories in Germany

Delivered straight to your inbox each morning.