Software vulnerabilities push credential abuse aside in cloud intrusions