Anatomy of Cloud Native Attacks and How to Stop Them