Navigating the Perils of Cloud Security: Lessons from Real-Life Hacks