This part examines the sophistication and adaptability of cyber actors in their efforts to compromise cloud infrastructure.