Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Cloud security compromised by constant upgrades
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Cloud security compromised by constant upgrades
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
AnalysisCloud Security

Cloud security compromised by constant upgrades

Tony Glover
September 19, 2023 at 5:39 AM
By Tony Glover Tony Glover
Share
Cloud Security
SHARE

Cloud Security

There is mounting evidence that companies may have been naive in accepting Big Tech’s optimistic assurances that sensitive data can be stored more securely in the cloud than on the company’s own servers.  In its latest Attack Surface Threat report, Silicon Valley-based cybersecurity firm Palo Alto Networks reveals that the cloud has now become “the dominant attack surface”, with four out of five security vulnerabilities observed in organizations across all sectors coming from a cloud environment.

The report follows mounting security fears in the IT industry regarding the cloud, such as computing giant IBM tracking 632 new cloud-related vulnerabilities (CVEs) between June 2022 and June 2023, representing a 194 percent increase from the previous year.

According to Palo Alto Networks’ latest report: “Modern organizations are racing to update their enterprise network architectures to take advantage of Zero Trust security designs, cloud computing, software-as-a-service (SaaS) value delivery, and distributed workforces. This has fueled a dramatic increase of infrastructure, known and unknown, which in turn has greatly increased the complexity of securing their environments.”

Big Tech must bear responsibility

It is of course, inevitable that the huge repositories of highly-saleable data that sit on the cloud would attract the attention of extremely well-organized and resourceful cybercriminal groups as well as hostile nation-states bent on gathering intelligence. But Big Tech must also bear a large part of the responsibility for the cloud’s increasing level of insecurity. By following the long-accepted Silicon Valley stratagem of releasing products and services that require constant upgrades, cloud service providers such as Google and Microsoft may have unwittingly been opening a series of backdoors for cybercriminals.

“Constant change in the cloud creates new risk. Cloud-based IT infrastructure is always in a state of flux. In a given month, an average of 20 percent of an organization’s cloud attack surface will be taken offline and replaced with new or updated services. The deployment of these new services is generally responsible for nearly half of the organizations’ new high or critical cloud exposures every month,” reports Palo Alto Networks.

Organizations in some sectors are currently having to cope with their cloud services being updated even more frequently by their service provider. The insurance and financial sector, always a prime target for cybercriminals, have to cope with an average of 24 percent of its attack surface being replaced with updated services, while transport and logistics are obliged to deal with 27 percent of its attack surface being taken offline every month.

Until Big Tech breaks its long-term habit of expecting customers to assist with ongoing product development, organizations that have sensitive data currently stored on the cloud should attempt to mitigate cybersecurity risks where they can. Palo Alto Networks recommends that companies should start by maintaining a comprehensive, real-time understanding of all internet-accessible assets, including cloud-based systems and services.

TAGGED: attack surface threat report, big tech, cloud, cloud computing, cloud security, cloud storage, financial, google, ibm, insurance, logistics, Microsoft, palo alto networks, saas, zero trust security
Tony Glover September 20, 2023 September 19, 2023
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article The Daily Decrypt - One Minute Roundup BlackCat gang wields new weapon to target cloud storage – September 18th
Next Article The Daily Decrypt - One Minute Roundup US fleet management systems impacted in ransomware attack – September 19th
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsOne Minute RoundupOne Minute Roundup

UK backs AI and intelligence modernization – June 12th

The UK government has announced its plans to invest in digital and artificial intelligence (AI) in public services, including the NHS, aiming to build strong technology foundations and tackle urgent cybersecurity risks.

June 12, 2025
cybercrimeNewsransomwareRussia

Teenage hackers run rings around cyber-defenses

The recent UK retail cyberattacks that impacted Marks & Spencer and the Co-Op supermarket chain are only the tip of a very large iceberg that now threatens organizations on both sides of the Atlantic. Although media reports have attributed the attacks to a group named “Scattered Spider,” the actual threat is far bigger. For a start, there is no criminal group that actually calls itself “Scattered Spider”, which is just a made-up name attributed by cybersecurity researchers. These attacks and many others in the US and the UK are now known to be the work of a vast sprawling network of hackers, some as young as 14, spread across the US and the UK. They call themselves “the Community”, or “the Com” for short, and are essentially a vast teenage subculture of criminal hackers.

June 10, 2025
NewsOne Minute Roundup

Deepfake Phishing Targets Trump’s Chief of Staff – May 30th

In today's daily roundup - Deepfake Phishing Targets Trump’s Chief of Staff, ConnectWise Breached by Suspected Nation-State Actor, and Unbound Security Raises $4M Seed Funding.

May 30, 2025
MalwareNews

AI increasingly used to deliver malware

Many organizations’ ongoing enthusiasm for incorporating artificial intelligence (AI) is leaving them open to sophisticated and carefully planned cyber-attacks. Cybersecurity company Mandiant, a Google subsidiary,  has issued an urgent warning for companies to be wary of downloading AI tools from unvetted websites.

May 30, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?