• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Most Third-Party Cloud Containers Have Vulnerabilities

You are here: Home / General Cyber Security News / Most Third-Party Cloud Containers Have Vulnerabilities
September 29, 2021

The wide bulk of third-party code utilised in cloud infrastructure includes vulnerabilities and misconfigurations, which could go away businesses uncovered to attack, according to Palo Alto Networks.

The security vendor’s Unit 42 Cloud Risk Report 2H 2021 used data from many general public sources greater to recognize the menace from cloud software package offer chains.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


It unveiled that 63% of third-party code templates made use of to establish cloud infrastructure incorporate insecure configurations, when 96% of third-party container apps deployed in cloud infrastructure have regarded vulnerabilities.

Unvetted third-party code can introduce vulnerabilities and malware inserted on goal by risk actors. A Sonatype study from earlier this thirty day period unveiled a 650% spike in upstream offer chain attacks of this nature.

To highlight the problem, Unit 42 analyzed public Terraform modules and located around 2500 have been misconfigured in regions this kind of as encryption, logging, networking, backup and restoration, and identity and obtain management.

“Teams keep on to neglect DevOps security, because of in component to deficiency of focus to supply chain threats. Cloud-indigenous programs have a extensive chain of dependencies, and people dependencies have dependences of their own,” the vendor stated.

“DevOps and security teams have to have to achieve visibility into the bill of products in every cloud workload in order to examine risk at just about every stage of the dependency chain and build guardrails.”

Together with its assessment of general public facts resources, Unit 42 was not too long ago commissioned by a SaaS purchaser of Palo Alto Networks to run a pink team exercising on its atmosphere. It discovered critical flaws in its software enhancement processes, which exposed the organization to attacks related to individuals on SolarWinds and Kaseya.

“The shopper whose development setting was analyzed in the crimson team physical exercise has what most would contemplate a mature cloud security posture,” the vendor claimed. “However, their progress natural environment contained various critical misconfigurations and vulnerabilities, enabling the Unit 42 staff to acquire more than the customer’s cloud infrastructure in a make any difference of days.”


Some sections of this article are sourced from:
www.infosecurity-journal.com

Previous Post: «hackers targeting brazil's pix payment system to drain users' bank Hackers Targeting Brazil’s PIX Payment System to Drain Users’ Bank Accounts
Next Post: CISA and NSA Deliver New Security Guidance for VPNs Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.