The two biggest cloud security risks continue to be misconfigurations and vulnerabilities, which are being introduced in greater numbers through software supply chains, according to a report by Sysdig.
While zero trust is a top priority, data showed that least privilege access rights, an underpinning of zero trust architecture, are not properly enforced. Almost 90% of granted permissions are not used, which leaves many opportunities for attackers who steal credentials, the report noted.
More Stories
NCSC Urges Users to Patch Next.js Flaw Immediately
The UK’s National Cyber Security Agency has called on Next.js users to patch CVE-2025-29927 Read More
US Seizes $8.2m from Romance Baiting Scammers
The DoJ has managed to recoup over $8m from scammers, stolen in romance baiting schemes Read More
How Each Pillar of the 1st Amendment is Under Attack
“Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom...
Friday Squid Blogging: Squid Werewolf Hacking Group
In another rare squid/cybersecurity intersection, APT37 is also known as “Squid Werewolf.” As usual, you can also use this squid...
Solar Power System Vulnerabilities Could Result in Blackouts
Forescout researchers found multiple vulnerabilities in leading solar power system manufacturers, which could be exploited to cause emergencies and blackouts...
Nine in Ten Healthcare Organizations Use the Most Vulnerable IoT Devices
Claroty revealed that 89% of healthcare organizations use the top 1% of riskiest Internet-of-Medical-Things (IoMT) devices Read More