Tech »  The most common way threat actors infiltrate cloud environments