Top
image credit: Adobe Stock

Attackers Can Compromise Most Cloud Data in Just 3 Steps

September 13, 2022

Companies and their cloud providers often leave vulnerabilities open in their system and services, gifting attackers with an easy path to gain access to critical data.

According to an Orca Security analysis of data collected form major cloud services and released on Sept. 13, attackers only need, on average, three steps to gain access to sensitive data, the so-called “crown jewels,” starting most often — in 78% of cases — with the exploitation of a known vulnerability.

Read More on Dark Reading