Companies and their cloud providers often leave vulnerabilities open in their system and services, gifting attackers with an easy path to gain access to critical data.
According to an Orca Security analysis of data collected form major cloud services and released on Sept. 13, attackers only need, on average, three steps to gain access to sensitive data, the so-called “crown jewels,” starting most often — in 78% of cases — with the exploitation of a known vulnerability.