Google's Mandiant security team has documented a critical shift in cloud attack patterns that demands immediate attention from UK business leaders. For the first time, software vulnerability exploitation has overtaken weak credential attacks as the primary threat vector against Google Cloud environments. This isn't just a statistical curiosity—it represents a fundamental change in how quickly organisations must respond to emerging threats.
The Mathematics of Modern Exploitation
The data reveals attackers are exploiting remote code execution (RCE) vulnerabilities within days of public disclosure, not the weeks or months previously observed. Zero-day exploits, once reserved for nation-state actors, are becoming commodity tools in criminal campaigns. Google's analysis shows this acceleration stems from improved automation in exploit development and the increasing sophistication of vulnerability scanning tools used by threat actors.
For UK businesses running cloud infrastructure, this compression of the exploitation timeline eliminates the traditional grace period between vulnerability disclosure and active threat. The comfortable assumption that "we'll patch it next month" has become a liability that could result in regulatory action under NIS2 requirements coming into force.
Why Traditional Patch Cycles Are Now Insufficient
Most UK SMEs operate monthly or quarterly patch cycles inherited from on-premises infrastructure management. These schedules were designed when vulnerabilities took weeks to weaponise and attackers focused on password spraying and credential stuffing. The new reality demands a risk-based approach where critical RCE vulnerabilities receive emergency patching within 72 hours of disclosure.
The challenge extends beyond technical capability. Many organisations lack the governance structure to authorise emergency changes outside standard maintenance windows. When a critical vulnerability emerges on a Tuesday afternoon, waiting for the next change board meeting on Thursday could be catastrophic.
Practical Response Framework for UK Businesses
Successful adaptation requires three immediate changes. First, implement automated vulnerability scanning that feeds directly into change management processes, eliminating manual discovery delays. Second, establish pre-authorised emergency patch procedures that bypass normal approval chains for critical security updates. Third, develop vendor-specific response playbooks that account for cloud providers' varying notification and remediation timelines.
The NCSC's vulnerability management guidance provides a foundation, but organisations must supplement this with cloud-specific procedures. Google Cloud's Security Command Centre offers native vulnerability detection, but many UK businesses haven't configured it to trigger immediate responses. Similarly, automated patching capabilities exist but remain underutilised due to concerns about service disruption.
Board-Level Action Required
This shift demands board-level recognition that cybersecurity risk management has fundamentally changed. The days when IT security was primarily about password policies and user training are ending. Modern threats exploit the infrastructure itself, and the window for response has collapsed to days, not weeks.
Boards should immediately review their organisation's vulnerability management capabilities and authority structures. If your IT team cannot implement critical security patches within 72 hours of disclosure without executive approval, your governance model is now a security liability. The investment required to establish rapid response capabilities is minimal compared to the potential impact of a successful RCE exploit against your cloud infrastructure.
The question isn't whether your organisation will face an attempted exploitation of a critical vulnerability, but whether you can respond fast enough when it happens.
Related Reading
Why Cloud Attackers Stopped Caring About Your Passwords — Google's latest threat report reveals attackers are bypassing traditional access controls entirely, exploiting cloud app
Zero-Click Excel Bug Turns Copilot Into Corporate Data Thief — CVE-2026-26144 allows attackers to exploit Microsoft 365 Copilot through malicious Excel files, turning AI assistance in
Strengthen your organisation's security posture

