AI Adoption Fuels 'Massive' Cloud Attack Surface Expansion, Palo Alto Networks Report Warns

Palo Alto Networks Report: 99% of Organizations See Attacks on AI Systems Amid Surge in Cloud Risk

INFORMATIONAL
December 17, 2025
December 25, 2025
5m read
Cloud SecurityThreat IntelligencePolicy and Compliance

Related Entities(initial)

Organizations

Palo Alto Networks

Products & Tech

Artificial Intelligence (AI)

Full Report(when first published)

Executive Summary

The enterprise rush to adopt Artificial Intelligence is creating a massive and unmanageable expansion of the cloud attack surface, according to the Palo Alto Networks 'State of Cloud Security Report 2025'. The report surveyed over 2,800 global security executives and found a critical disconnect between the speed of AI-driven development and the ability of security teams to manage the associated risks. A concerning 99% of organizations reported attacks against their AI applications and services in the past year, confirming that AI-related threats are now mainstream. The report highlights that generative AI is accelerating the creation of insecure code, while attackers are increasingly targeting foundational cloud components like APIs and identity. The findings underscore an urgent need for organizations to consolidate security tooling and adopt a unified platform approach to secure their cloud and AI ecosystems at machine speed.


Regulatory Details

This article summarizes a security research report, not a specific regulation. However, the findings have significant implications for compliance with various data protection and cybersecurity standards. The report highlights systemic risks that could lead to non-compliance with regulations like GDPR, CCPA, and industry-specific rules (e.g., HIPAA, PCI-DSS) if not addressed.

Key findings from the report include:

  • Universal AI Adoption & Risk: 99% of organizations now use generative AI-assisted coding, but this is creating a flood of vulnerabilities. While 52% of development teams ship code weekly, only 18% of security teams can remediate flaws at the same pace.
  • Widespread AI Attacks: 99% of organizations experienced at least one attack on their AI systems in the past year, demonstrating a clear and present danger.
  • Shifting Attacker Focus: Threat actors are targeting the foundational layers of the cloud. API attacks saw a 41% year-over-year increase, the sharpest rise of any threat vector. This is directly linked to AI's heavy reliance on APIs.
  • Identity as a Weak Link: 53% of respondents cited lenient Identity and Access Management (IAM) practices as a top security challenge, making it a prime target for credential theft and lateral movement.
  • Tool Sprawl & Inefficiency: The average organization uses 17 different cloud security tools from five vendors, leading to fragmented visibility, security gaps, and slower incident response. Consequently, 97% of organizations are looking to consolidate their security tools.

Affected Organizations

The report's findings apply globally to nearly all organizations utilizing cloud services and adopting AI technologies. The survey spanned 10 countries and included a wide range of industries, indicating that these challenges are universal. Any organization that is developing or deploying applications in the cloud, using generative AI for code development, or exposing APIs for AI services is directly affected by the risks identified in this report. This includes sectors from technology and finance to healthcare and manufacturing.


Compliance Requirements

While not a mandate, the report strongly implies a set of best practices required to maintain a secure and compliant posture in the age of AI:

  1. Secure AI/ML Lifecycles: Organizations must integrate security into the entire AI development lifecycle (DevSecOps), from data ingestion and model training to deployment and monitoring.
  2. Code Security at Scale: Implement automated security scanning tools within CI/CD pipelines to detect and remediate insecure code generated by AI assistants before it reaches production. This addresses the gap between development speed and security remediation pace.
  3. API Security Governance: Establish strong governance for API security, including inventory, testing, and runtime protection. Given the 41% surge in API attacks, this is a critical control.
  4. IAM and Least Privilege: Enforce strict, context-aware IAM policies based on the principle of least privilege. This is essential to mitigate the risk of credential theft and lateral movement, cited as a top challenge by 53% of respondents.
  5. Platform Consolidation: Move away from a fragmented, multi-vendor toolset towards a unified cloud-native application protection platform (CNAPP) that provides end-to-end visibility and correlates data from across the cloud estate.

Impact Assessment

The business and operational impacts of failing to address the issues raised in the report are significant:

  • Increased Breach Likelihood: The growing gap between vulnerability creation and remediation directly increases the likelihood of a successful cyberattack and subsequent data breach.
  • Slower Incident Response: Tool sprawl and fragmented data mean security teams take longer to detect, investigate, and respond to incidents, increasing the potential damage.
  • Compliance Failures: The lack of visibility and control over AI-generated code and sprawling cloud assets can lead to non-compliance with data protection regulations, resulting in heavy fines.
  • Erosion of Trust: A successful attack on an organization's AI systems could erode customer trust, particularly if it involves the manipulation of AI models or the theft of sensitive training data.

Compliance Guidance

To address the challenges outlined in the Palo Alto Networks report, organizations should adopt a strategic, platform-based approach:

  1. Prioritize CNAPP Adoption: Make the consolidation of cloud security tools onto a single Cloud-Native Application Protection Platform (CNAPP) a strategic priority. This will unify visibility across Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWP), and API security.
  2. Embed Security in CI/CD: Integrate Infrastructure as Code (IaC) scanning and code analysis tools directly into developer workflows and CI/CD pipelines. Provide developers with immediate feedback on security issues in their AI-generated code.
  3. Implement Zero Trust for Cloud: Apply Zero Trust principles to cloud environments, focusing on strong identity verification, micro-segmentation, and enforcing least-privilege access for all human and machine identities, especially those related to AI services and APIs.
  4. Develop an AI Security Program: Establish a formal program for AI security that includes threat modeling for AI/ML systems, data provenance checks, and continuous monitoring of AI models for signs of tampering or abuse.

Timeline of Events

1
December 16, 2025
Palo Alto Networks releases its 2025 'State of Cloud Security Report'.
2
December 17, 2025
This article was published

Article Updates

December 25, 2025

ServiceNow acquires Armis for $7.75B, creating an AI-native security platform, exemplifying industry consolidation to address AI-driven cloud risks.

ServiceNow's acquisition of Armis for $7.75 billion marks a significant industry move towards platform consolidation, directly addressing the need for unified cloud security solutions highlighted in the Palo Alto Networks report. This deal aims to integrate Armis's agentless asset visibility with ServiceNow's workflow automation, creating an AI-native security platform to manage and remediate threats across the entire technology estate. This development reinforces the report's call for a platform-based approach to counter the expanding cloud attack surface fueled by AI.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

AI SecurityAPI SecurityCNAPPCloud SecurityDevSecOpsIAMPalo Alto NetworksThreat Intelligence

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading