Top cloud infrastructure risks faced by real-world organizations

Feb 26, 2021

Cloud environments most vulnerable to watering hole attack

As demonstrated by a recent high-profile hack, attackers increasingly strive to leverage weaknesses that enable them to deliver malware to end users, gain unauthorized access to production environments or their data, or completely compromise a target environment. This strategy is known as a watering hole attack, and researchers have seen them emerge in cloud environments where they can cause even more damage.

This is partly because development processes in the cloud that leverage managed services are not hidden inside the organization as they are in on-premise environments – in fact, they’re largely exposed to the world.

When criminals are able to exploit misconfigurations in development pipelines, it can spell disaster not only for the company but also its customers. To address this risk, enterprises should assume the entire development process is easily accessible, and restrict access to only the users who need it.

“Cloud native apps and services are more vital than ever before, and any risk in the infrastructure has critical implications,” said Accurics CTO & CISO Om Moolchandani.

Read More >

We use cookies to ensure you get the best experience on our website. By continuing to browse this site, you acknowledge the use of cookies.