logo-default
  • HOME
  • ABOUT US
  • LITIGATION SUPPORT SERVICES
  • CYBER SECURITY SERVICES
  • BLOG
Return to previous page
Home Blog Cybersecurity Compliance

Cloud CVEs Surge 200% in a Year

Cloud CVEs Surge 200% in a Year

September 14, 2023 /Posted byadmin / 9 / 0

[ad_1]

IBM tracked 632 new cloud-related vulnerabilities (CVEs) between June 2022 and June 2023, a 194% increase from the previous year, according to a new report from the tech giant.

The IBM X-Force Cloud Threat Landscape Report 2023 was compiled from the firm’s threat intelligence, incident response engagements and pen tests, alongside dark web analysis, input from Cybersixgill and the Red Hat Insights service.

The latest haul of new CVEs brings the total number tracked by the vendor to 3900, a number that has apparently doubled since 2019.

It revealed that just over 40% of the CVEs discovered during the current reporting period could allow an attacker to obtain information (21%) or gain access (20%).

However, the top initial access vector for cloud compromise during the period was the use of valid credentials by threat actors. This happened in 36% of real-world cloud incidents, with credentials either discovered during an attack or stolen prior to targeting a specific victim, the report noted.

Read more on cloud threats: Cloud Email Threats Soar 101% in a Year

The figure is up significantly from the 9% of incidents that featured compromised credentials in 2022. IBM analyst Chris Caridi argued it “highlights the need for organizations to move beyond human-reliant authentications and prioritize technological guardrails capable of securing user identity and access management.”

Poor security practices are making matters far easier for attackers than they should be. The X-Force team found plaintext credentials located on user endpoints in a third (33%) of engagements involving cloud environments.

“In particular, there was a high frequency of service account credentials stored on endpoints, and many were overprivileged,” the report explained. “Excessively privileged users can be defined as those who have more permissions than they need to do their job or task.”

In joint second place as the next most common access vectors were exploitation of public-facing applications and phishing and spear phishing, which accounted for 14% each of engagements.

Although all regions suffered cloud-based attacks, Europe accounted for the vast majority (64%) followed by North America at 29%. Red Hat Insights data supported these findings, revealing that European organizations accounted for 87% of malware scans, followed by North America at 12%.

[ad_2]

Threat actor leaks sensitive d...
Kubernetes flaws could lead to...

Related posts

Read more

Cybersecurity Pros Urge US Congress to Help NIST Restore NVD Operation

April 17, 2024 0
... Continue reading
Read more

LeakyCLI Flaw Exposes AWS and Google Cloud Credentials

April 16, 2024 0
... Continue reading
Read more

Report Suggests 93% of Breaches Lead to Downtime and Data Loss

April 16, 2024 0
... Continue reading
Read more

Open Source Leaders Warn of XZ Utils-Like Takeover Attempts

April 16, 2024 0
... Continue reading
Read more

Palo Alto Networks Zero-Day Flaw Exploited in Targeted Attacks

April 16, 2024 0
... Continue reading

Add comment Cancel reply

Your email address will not be published. Required fields are marked

Search