This research aims to present the entire kill-chain of attacks against cloud native environments. Based on the attacks against our honeypots, this research publication provides a cohesive analysis. By examining the trends and behaviors identified in the past attacks, we are able to predict how this threat landscape will continue to morph, arming you with knowledge and tools to protect your environment