• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Quarter of Fortune 500’s External IT Assets Are a Cyber Risk

You are here: Home / General Cyber Security News / Quarter of Fortune 500’s External IT Assets Are a Cyber Risk
September 15, 2021

The external attack area of Fortune 500 firms is made up of regarded, exploitable vulnerabilities and security issues, according to new analysis from Cyberpion.

The Israeli startup compiled its results from a “single-pass scan” of the public and internet-dealing with property of each and every Fortune 500 corporation in the 1st 50 % of 2021.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Just about three-quarters (73%) of these organizations’ IT infrastructure is now positioned externally, but this outsourcing development appears to have created a significant visibility hole. Some 24% of these property are regarded as risky or have a identified vulnerability, Cyberpion claimed.

This features a quarter (25%) of externally hosted cloud-centered belongings that unsuccessful at minimum a single security take a look at, these types of as misconfigured storage.

The report also claimed that the normal Fortune 500 firm has 126 various login pages for clients and workers — but 10% of these permit details transmission over unencrypted HTTP or have invalid certificates.

Fortune 500 firms also connect to an common of 951 cloud assets, but pretty much 5% of these are susceptible to severe abuse, Cyberpion claimed. This includes AWS buckets misconfigured, which could let hackers to examine or overwrite purchaser facts or code.

The seller warned that attackers could acquire advantage of these gaps in visibility and protection to launch Magecart-design attacks, DNS hijacks or brand name abuse — resulting in fiscal and reputational harm.

“Security teams frequently just cannot properly defend from attacks stemming from 3rd functions simply because they absence visibility into the whole stock and volume of property they are related to,” said Cyberpion CEO Nethanel Gelertner.

“They are unaware of the exposure to these exterior vulnerabilities and can not discover and mitigate towards these pitfalls. In addition, the growth of these interconnected property carries on to explode due to trends in cloud-to start with architectures and digital transformation initiatives, indicating that assessing and guarding the attack surface has turn out to be even additional difficult around time.”


Some elements of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Microsoft Patches OMIGOD, MSHTML and PrintNightmare Bugs
Next Post: Cyber crime in Australia increased 13% in the last year cyber crime in australia increased 13% in the last year»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.