{"id":37538,"date":"2023-04-19T07:45:39","date_gmt":"2023-04-19T11:45:39","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=37538"},"modified":"2023-04-25T10:29:35","modified_gmt":"2023-04-25T14:29:35","slug":"palo-alto-releases-seventh-unit-42-cloud-threat-report","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/palo-alto-releases-seventh-unit-42-cloud-threat-report\/","title":{"rendered":"Palo Alto releases seventh Unit 42 Cloud Threat Report"},"content":{"rendered":"<p data-ar-index=\"1\">Palo Alto Networks has released the seventh edition of its Unit 42 Cloud Threat Report, which provides a comprehensive overview of the current state of cloud security. The research assesses the security of over 1,300 organizations and the workloads in 210,000 cloud accounts\/subscriptions\/projects across all of the main Cloud Service Providers (CSPs).<\/p>\n<p data-ar-index=\"2\">According to the report, it takes an average of 145 hours (or almost six days) for security teams to handle a security alert, and 60% of firms wait more than four days to address security issues. Furthermore, in most firms&#8217; cloud systems, just 5% of security rules produce 80% of warnings.<\/p>\n<p data-ar-index=\"3\">Furthermore, according to the research, 63% of codebases utilized contain serious or critical unresolved vulnerabilities, as graded by the Common Vulnerability Scoring System (CVSS 7.0). According to the research, sensitive data is found in 66% of storage buckets and 63% of publicly accessible storage buckets.<\/p>\n<p data-ar-index=\"4\">Also, 51% of codebases rely on more than 100 open-source packages, with just 23% being explicitly imported by developers. The rising usage of open-source software (OSS) on the cloud, on the other hand, adds supply chain vulnerabilities. Over 7,300 malicious OSS packages were discovered in all major package management registries.<\/p>\n<p data-ar-index=\"5\">Hard-coded credentials are still used by 83% of firms in their source control management systems, and 85% use them in virtual machine user data. Weak authentication practices continue, with 76% of businesses not requiring MFA for console users, 58% not requiring MFA for root\/admin users, and 57% not requiring password symbols.<\/p>\n<p data-ar-index=\"6\">Publicly accessible cloud resources are also a risk, with 73% of firms exposing RDP to the public internet, 75% exposing SSH services, and 41% exposing database services.<\/p>\n<p data-ar-index=\"7\">The sources for this piece include an article in <a href=\"https:\/\/unit42.paloaltonetworks.com\/cloud-threat-report-expanding-attack-surface\/\" target=\"_blank\" rel=\"noopener\">PaloAltoNetworks<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks has released the seventh edition of its Unit 42 Cloud Threat Report, which provides a comprehensive overview of the current state of cloud security. The research assesses the security of over 1,300 organizations and the workloads in 210,000 cloud accounts\/subscriptions\/projects across all of the main Cloud Service Providers (CSPs). According to the [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19],"tags":[388],"class_list":["post-37538","post","type-post","status-publish","format-standard","hentry","category-cloud","tag-privacy-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/37538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=37538"}],"version-history":[{"count":2,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/37538\/revisions"}],"predecessor-version":[{"id":37540,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/37538\/revisions\/37540"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=37538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=37538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=37538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}