Google Cloud Security released an updated Threat Horizons report containing information about the top security risks.
Google Cloud Security released an updated Threat Horizons report containing information about the top security risks. This is the tenth revision to the report and it went into detail about initial access vectors of concern, observed impacts of intrusion, and other data from this year in cybersecurity.
The findings in this report demonstrate that weak credentials, misconfiguration, serverless infrastructure, and insecure architecture were key vulnerabilities.
“Weak or no credentials remained a key driver of initial access, accounting for the most frequent successful vector and the second most commonly seen trigger for detection rules.”
Authentication and authorization have always been among two of the most overlooked aspects of cybersecurity and weak authentication or authorization can allow hackers to easily gain initial access without necessary credentials.
“Misconfiguration, however, jumped to over 30%, largely due to the high volume of detections of misconfigured or poorly configured environmental factors. ”
Some other interesting observations:
Overall, we’ve seen significant new cyber risks and an increase in the volume of old vulnerabilities being exploited. And with the introduction of new technology such as AI, attacks are only becoming more complex.
Read the Google Cloud Security Report here for more information on the biggest web threats at large. For a more API-specific report, check out FireTail’s State of API Security 2024 report here.