City
Epaper

Credential issues accounted for over 60% of compromise factors in Q1: Report

By IANS | Updated: August 4, 2023 13:20 IST

New Delhi, August 4 In the first quarter (Q1) of 2023, credential issues accounted for over 60 per ...

Open in App

New Delhi, August 4 In the first quarter (Q1) of 2023, credential issues accounted for over 60 per cent of compromise factors, while misconfiguration accounted for 19 per cent of compromise factors, a new report showed on Friday.

According to the Google Cloud Threat Horizon Report, areas such as weak or no passwords, sensitive UI or API exposed, leaked credentials, vulnerable software, misconfiguration, and others were predominant vectors for unauthorised access.

The report also detailed an emerging challenge -- mobile apps evading cloud enterprise detection through versioning.

Researchers have identified instances of Android applications downloading malicious updates after installation, attempting to evade Google Play Store's malware detections.

Malicious actors can avoid detection algorithms based on static identifiers or patterns using different mobile app versions.

Moreover, the report also covered a growing issue within the cloud environment -- the identification of compromised customer domains and IPs on Google Cloud.

Researchers discovered 13 customer domains and one IP hosted on Google Cloud that were compromised in Q1 2023, using 2022-23 VirusTotal and Mandiant data.

Issues within the telecommunication industry were also highlighted in the report.

It also warned that nation-state hacking and cybercriminal threats won't vanish as the industry embraces cloud services and that modern cybersecurity approaches such as zero-trust can address pre-existing systemic cyber risks.

The researchers found that over the last two years, the most frequently targeted telecom subsectors include wireless telecommunications, IT and telecom services, and data services.

Digital security threats to telco industry business continuity and use of legacy systems will likely persist, along with an increased focus on cloud service providers, as the industry continues migrating critical IT operations and business support systems to the cloud, according to the report.

Finally, the report mentioned that it’s important to raise awareness of how source code compromises or leaks can help cyber threat actors facilitate various exploitation activities.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Tags: congresspitrodadelhimodideepikabjpwest-bengaldeepika-padukoneajay-devgnthakur
Open in App

Related Stories

NationalDelhi Crime: 47-Year-Old Man Robbed of Rs 25 Lakh by Two Bike-Borne Men; Police Probe On

NationalAbhinav Arora Attacked: Mob Attacks Child Spiritual Influencer’s Car With Stones And Sharp Weapons In Delhi Road Rage

CricketIPL 2026: Why Varun Chakaravarthy Is Not Playing in Today’s Kolkata Knight Riders vs Lucknow Super Giants? EXPLAINED

CricketIPL 2026, KKR vs LSG: Toss Result, Playing 11s, Impact Players and Pitch Report for Today’s Match

CricketIPL 2026, KKR vs LSG Today Match LIVE Cricket Streaming: When and Where To Watch Kolkata Knight Riders vs Lucknow Super Giants Match

Technology Realted Stories

TechnologyIndianOil conducts over 10,600 inspections, takes strict action against erring persons

TechnologyIndian stock market in positive territory, overall sentiment remains balanced

TechnologyCentre charts future roadmap for homoeopathy in advancing integrative healthcare

TechnologyRailroad users reach record high in Q1 in S. Korea amid rising oil

TechnologyS. Korea's debt-to-GDP ratio projected to reach 60 pc by 2030