This part presents key findings from recent advisories on how cyber actors are adapting their tactics to target cloud infrastructure, focusing on the stealthy methods they employ.