Twistlock Labs Uncovers Widespread Zero Touch Attacks Against Cloud Native Applications
Over 25 percent of Cloud Native Applications Vulnerable to Exploit; Over 90 percent of Attacks Automated
PORTLAND, Ore., Sept. 13, 2018 /PRNewswire/ -- Twistlock, the leader in cloud native cybersecurity, today released its first biannual state of cloud native security report, entitled Watching the Honeypots.
In this report, Twistlock Labs researchers analyzed deployments of common cloud native applications and ran honeypots to collect data on risk factors and attack patterns against cloud native services. The report shows that while over 60 percent of cloud native services are not kept up to date automatically, over 90 percent of attacks are automatically executed against outdated code and known CVEs.
"Adoption of cloud native technologies gives organizations a chance to build and deploy software faster, and scale and manage deployments with ease. But this speed and agility is often coming at the expense of foundational security practices," said Dima Stopel, Twistlock co-founder and VP Research & Development. "Organizations need to build automatic enforcement of security into their application pipelines – both to prevent vulnerable code from reaching production, but also to quickly triage and patch new risks in production."
Key findings include:
-Surveying the top cloud native applications, 25 percent were running with CVEs where a known exploit exists.
-MySQL was the most likely to be out of date, with over 80 percent of deployments being at least one version behind. Overall, 60 percent of all cloud native apps are not patched to the latest version.
-Over 90 percent of detected attacks were automatically executed – zero touch hacking that focuses on brute force or known exploits.
-China plays a significant role in the modern threat landscape with over 60 percent of detected attacks against cloud native applications originated from Chinese IP ranges.
Download the full report here.
About Twistlock Labs
Twistlock Labs, Twistlock's Security Research Team, is constantly trying to get into the minds of attackers to better understand how they would attempt to gain access to or potentially compromise your containerized and cloud native environments. We then take this data and share details on these threats or work directly with Twistlock R&D to include protection for real-world attack scenarios in the Twistlock Platform.
About Twistlock
Trusted by 25% of the Fortune 100, Twistlock is the most complete, automated and scalable container cybersecurity platform. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need. For more information, please visit www.twistlock.com
SOURCE Twistlock
Related Links
WANT YOUR COMPANY'S NEWS FEATURED ON PRNEWSWIRE.COM?
Newsrooms &
Influencers
Digital Media
Outlets
Journalists
Opted In
Share this article