DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Cloud

Dynamic cloud environments contribute 45% of new critical exposures per month: Palo Alto Networks

DigitalCIO Bureau by DigitalCIO Bureau
September 21, 2023
in Cloud, Tech News
0
Dynamic cloud environments contribute 45% of new critical exposures per month: Palo Alto Networks
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Rapid digital transformation has led to a sharp rise in organizational network infrastructure, known and unknown, thus greatly increasing the complexity of security environments. Exposures on public facing assets can lead to organizations becoming victims of opportunity rather than targeted attacks. Palo Alto Networks analyzed petabytes of data about internet-accessible exposures across 250 organizations globally between 2022 and 2023. The 2023 Unit 42 Attack Surface Threat Report found that cybercriminals are exploiting new vulnerabilities within hours of public disclosure and that organizations are finding it difficult to manage their attack surfaces at the speed and scale necessary to combat threat actor automation. Other notable findings from the report include:

Cloud Is the Dominant Attack Surface

  • Vast majority of security exposures are present in cloud environments at 80% as compared to on-premise at 19%.
  • Cloud-based IT infrastructure is always in a state of flux, changing by more than 20% across every industry every month.
  • For most organizations, over 45% of high-risk, cloud-hosted exposures each month were a result of the constant change in cloud-hosted new services going online and/or old ones being replaced.
  • Over 75% of publicly accessible software development infrastructure exposures were found in the cloud.

Attackers Move at Machine Speed

  • Today’s attackers have the ability to scan the entire IPv4 address space (containing over 4 billion addresses) for vulnerable targets in minutes.
  • Of the 30 Common Vulnerabilities and Exposures (CVEs) analyzed, three were exploited within hours of public disclosure and 63% were exploited within 12 weeks of the public disclosure.

Remote Access Exposures Are Widespread

  • Over 85% of organizations analyzed had Remote Desktop Protocol (RDP) internet-accessible for at least 25% of the month.
  • Eight of the nine industries that Unit 42 studied had internet-accessible RDP vulnerable to brute-force attacks for at least 25% of the month.
  • Median financial services and state or local government organizations had RDP exposures for the entire month.

Critical Industries Are Exposed

  • IT, security, and networking infrastructure make up the top exposures (48%) for manufacturing, which could lead to loss of production and revenue.
  • Financial institutions most frequently expose file sharing services (38%).
  • For national governments, insecure file sharing and databases are one of the most significant attack surface risks, accounting for over 46% of all the exposures in a typical national government organization.
  • For healthcare organizations, 56% of publicly exposed development environments are often misconfigured and vulnerable.
  • For utilities and energy, Internet-accessible IT infrastructure control panels account for 47% of the exposures.

Recommendations 

  • Gain continuous visibility over all assets: Ensure a comprehensive real-time understanding of all internet-accessible assets, including cloud based systems and services.
  • Prioritize remediation: Focus on remediating the most critical vulnerabilities and exposures based on CVSS (Common Vulnerability Scoring System) and EPSS (Exploit Prediction Scoring System).
  • Secure remote access services: Implement multifactor authentication (MFA), and monitor all remote access services for signs of unauthorized access or brute-force attacks.
  • Address cloud misconfigurations: Regularly review and update inevitable cloud misconfigurations to ensure they align with best security practices.

Tags: Palo Alto Networks
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Digital Fraud Overtakes Ransomware as CEOs’ Biggest Concern

by DigitalCIO Bureau
January 19, 2026
0
Retail Industry — Next Big Target for Hackers?

Artificial intelligence, geopolitical fragmentation and a surge in cyber-enabled fraud are redefining the global cyber risk landscape at unprecedented speed, according to the World Economic Forum’s Global Cybersecurity Outlook...

Read moreDetails

Cyera Secures $400M Series F, Hits $9B Valuation

by DigitalCIO Bureau
January 13, 2026
0
Cyera Secures $400M Series F, Hits $9B Valuation

Cyera has announced a $400 million Series F funding round, bringing its total funding to over $1.7 billion. This raise comes just six months after the previous round...

Read moreDetails

Trend Micro Closes Vulnerabilities in Apex Central

by DigitalCIO Bureau
January 9, 2026
0
Financial organizations receive an average of 2200+ application security vulnerability alerts every month: Dynatrace CISO Regional Bank 2023 report

The National Cyber ​​Security Centre (NCSC) is warning of vulnerabilities in Trend Micro Apex Central. These vulnerabilities could potentially cause a Denial-of-Service (DoS) attack. Updates addressing the vulnerability...

Read moreDetails

Aditya Birla Ventures invests in GenAI Company Articul8 AI

by DigitalCIO Bureau
January 9, 2026
0
AMD Acquires Open-Source AI Software Expert Nod.ai

Aditya Birla Ventures has announced its investment in the first tranche of Articul8 AI, Inc.’s oversubscribed Series B financing round. Articul8 AI, an enterprise generative AI (GenAI) software...

Read moreDetails

Snowflake Acquires Observe

by DigitalCIO Bureau
January 9, 2026
0
CRISIL To Acquire Bridge To India Energy

Snowflake has signed a definitive agreement to acquire Observe, a leader in AI-powered observability. With this acquisition, Snowflake will deliver the next generation of AI-powered observability, built on open standards...

Read moreDetails
Next Post
New Report Highlights Key Elements of Cloud Workload Security Landscape

New Report Highlights Key Elements of Cloud Workload Security Landscape

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Freshworks appoints Murali Swaminathan as CTO

Freshworks appoints Murali Swaminathan as CTO

September 5, 2024

Why Security Issues is Not an Concern in IoT Adoption

March 10, 2020

IBM launches cloud tool to detect AI bias

September 20, 2018

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?