• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Eliminating 2% of Exposures Could Protect 90% of Critical Assets

You are here: Home / Cyber Security News / Eliminating 2% of Exposures Could Protect 90% of Critical Assets

Only 2% of all exposures help attackers with seamless accessibility to critical property, while 75% of exposures along attack paths direct to “dead ends.”

The conclusions occur from the most up-to-date report by XM Cyber, which analyzed over 60 million exposures in about 10 million entities on-premise and in the cloud.

Penned in collaboration with the Cyentia Institute, the new study also implies that 71% of organizations have exposures in their on-premises networks that put their critical belongings in the cloud at risk. The moment there, 92% of critical belongings develop into vulnerable.

Read additional on cloud security listed here: A 2023 Guidebook to Protected Cloud Deployment for Enhanced Software Security

“Once attackers infiltrate cloud environments, it’s quick for them to compromise assets. Cloud security is not nonetheless mature, and many security groups really do not entirely recognize what security issues they have to have to appear for,” explained Zur Ulianitzky, vice president of investigate at XM Cyber.

More, the report demonstrates that average corporations have 11,000 exploitable security exposures every month, with tactics focusing on credentials and permissions affecting 82% of businesses and exploits accounting for around 70% of all discovered security exposures.

“Challenges also surface from how cloud identities and permissions are (mis)managed,” Ulianitzky extra. “Moving forward, organizations have to rethink their approach to security to be certain the safety of all of our identities, systems and interdependencies between them holistically.”

That being said, the XM Cyber report also showed that most security alerts are benign and do not guide to critical belongings. 

“Instead of focusing on a listing of 20,000 vulnerabilities to address, concentration on identifying the quickest wins in your exterior-experiencing infrastructure, then operate to minimize the scope of permissions that your user and company accounts have,” said Tanium security director of endpoint security study, Melissa Bischoping, commenting on the conclusions.

“By decreasing the amount of systems that consumers can entry, you decrease the risk of people credentials staying abused in later on levels of an attack, and you improve the efficacy of this apply when you stack on multi-element authentication and gadget overall health attestation.”

The XM Cyber report comes months soon after a Microsoft paper suggested that just 1% of all cloud permissions are actively applied.

Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: « Apple Patches Two Zero-Days Exploited in the Wild
Next Post: North Korean Hackers Uncovered as Mastermind in 3CX Supply Chain Attack »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS
  • New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App

Copyright © 2025 · AllTech.News, All Rights Reserved.