Cloud Security: Identity Attacks That Exploit Your Broken Authentication