CyberScoop reports that cloud infrastructure compromise has become increasingly prevalent and will only further increase amid the growing adoption of cloud technologies and large language models.
Organizations should ensure that their cloud systems are protected against the escalating threat of source code exposure, which has been mostly attributed to third-party compromise, credential or token theft, insider threats, and system misconfigurations, according to a report from Google Cloud.
Researchers have also urged for the protection of cloud environments so as not to be exploited to target other organizations. The report also showed that malicious apps have been circumventing Google Play's security measures through the delayed uploading of malicious code from threat actors' infrastructure.
The telecommunications sector has also been noted to be facing more state-sponsored cybersecurity threats.
"Officials worldwide have expressed concern that Chinese state control over 5G telecom vendors could allow for Chinese state influence over data flows, which has resulted in equipment bans in North America, Europe, and Asia," said the report.
Cloud Security
Cloud infrastructure attacks to further escalate
An In-Depth Guide to Cloud Security
Get essential knowledge and practical strategies to fortify your cloud security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds