spot_img

96% Of Third-party Container Applications Contain Known Bugs

Share post:

96% of third-party container applications deployed in the cloud infrastructure contain known vulnerabilities.

The Palo Alto Unit 42 researchers reported this in their conclusions on the growing threats organizations face in their software supply chains today.

The report also revealed that several critical misconfigurations and vulnerabilities allowed the Unit 42 team to take over the customer’s cloud infrastructure within days, even for customers with a “mature” cloud security posture.

The report states: “In most supply chain attacks, an attacker compromises a vendor and inserts malicious code in software used by customers. Cloud infrastructure can fall prey to a similar approach in which unvetted third-party code could introduce security flaws and give attackers access to sensitive data in the cloud environment. Additionally, unless organizations verify sources, third-party code can come from anyone, including an Advanced Persistent Threat.”

For Valtix CTO Vishal Jain, he suggested that companies should focus on security during construction, including scanning IaC originals used to build cloud infrastructure and security at runtime.

For more information, read the original story in ZDNet.

spot_img

SUBSCRIBE NOW

Related articles

Microsoft to block emails from “Persistently Vulnerable Exchange Servers”

Microsoft has announced a new security feature for Exchange Online that will gradually throttle and eventually block emails...

Pinduoduo removed from Google Play Store after cyberattack

According to security researchers at Lookout, Pinduoduo has been involved in a complex malware attack through its application,...

Twitter source code leaked, demands GitHub reveal who posted it there

New York Times says the code posted on GitHub had been there for months. raising securit

Okta’s login flaw exposes users to attack, says Mitiga

According to Mitiga, Okta's login system contains a simple error that could expose its users to future attacks. Users...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways