Why Cloud Environments Are a Prime Target for Hackers?