{"id":23096,"date":"2021-02-26T05:45:09","date_gmt":"2021-02-26T10:45:09","guid":{"rendered":"https:\/\/devopsnews.online\/?p=23096"},"modified":"2021-02-26T05:45:09","modified_gmt":"2021-02-26T10:45:09","slug":"new-research-reveals-more-new-cloud-watering-hole-attacks","status":"publish","type":"post","link":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/","title":{"rendered":"New research reveals more new cloud watering hole attacks"},"content":{"rendered":"

New research from Accurics revealed an increased adoption of managed infrastructure services as well as a rise in new cloud watering hole attacks.<\/p>\n

Indeed, it was found out that 23% of attacks originated from poorly configured managed service offerings, which resulted from default security profiles or configurations.<\/p>\n

The report shows that attackers have increasingly strived to leverage weaknesses in order to deliver malware to end-users as well as gain unauthorized access to production environments and their data. It could also completely compromise a target environment.<\/p>\n

This is then known as a watering hole attack, which can cause a lot of damage in cloud environments. It could be a disaster for companies and customers, putting them at serious risk. In order to prevent this, businesses should make sure that the development process is accessible all the while restricting access to users who need it.<\/p>\n

Moreover, the research notes that the meantime to remediate issues (MTTR) for such violations is 25 days across all environments, which gives plenty of time to cyberattackers.<\/p>\n

Hence, the report suggests that organizations establish a secure baseline and be quick to address the issue if it arises.<\/p>\n","protected":false},"excerpt":{"rendered":"

New research from Accurics revealed an increased adoption of managed infrastructure services as well as a rise in new cloud watering hole attacks. Indeed, it was found out that 23% of attacks originated from poorly configured managed service offerings, which resulted from default security profiles or configurations. The report shows that attackers have increasingly strived…<\/p>\n","protected":false},"author":123458,"featured_media":23097,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","pmpro_default_level":"","footnotes":""},"categories":[3239,1158],"tags":[70,721,297,448,112],"yoast_head":"\nNew research reveals more new cloud watering hole attacks - DevOps Online North America<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New research reveals more new cloud watering hole attacks - DevOps Online North America\" \/>\n<meta property=\"og:description\" content=\"New research from Accurics revealed an increased adoption of managed infrastructure services as well as a rise in new cloud watering hole attacks. Indeed, it was found out that 23% of attacks originated from poorly configured managed service offerings, which resulted from default security profiles or configurations. The report shows that attackers have increasingly strived...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"DevOps Online North America\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-26T10:45:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/devopsnews.online\/wp-content\/uploads\/2021\/02\/adrien-olichon-gOdavfpH-3s-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yashesh Patel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DevOpsAmerica\" \/>\n<meta name=\"twitter:site\" content=\"@DevOpsAmerica\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yashesh Patel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/\"},\"author\":{\"name\":\"Yashesh Patel\",\"@id\":\"https:\/\/devopsnews.online\/#\/schema\/person\/1183cef5fa13624c55f3faf81f391435\"},\"headline\":\"New research reveals more new cloud watering hole attacks\",\"datePublished\":\"2021-02-26T10:45:09+00:00\",\"dateModified\":\"2021-02-26T10:45:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/\"},\"wordCount\":197,\"publisher\":{\"@id\":\"https:\/\/devopsnews.online\/#organization\"},\"image\":{\"@id\":\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/devopsnews.online\/wp-content\/uploads\/2021\/02\/adrien-olichon-gOdavfpH-3s-unsplash-scaled.jpg\",\"keywords\":[\"Cloud\",\"cyberattack\",\"cybersecurity\",\"data\",\"security\"],\"articleSection\":[\"News\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/\",\"url\":\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/\",\"name\":\"New research reveals more new cloud watering hole attacks - DevOps Online North America\",\"isPartOf\":{\"@id\":\"https:\/\/devopsnews.online\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/devopsnews.online\/wp-content\/uploads\/2021\/02\/adrien-olichon-gOdavfpH-3s-unsplash-scaled.jpg\",\"datePublished\":\"2021-02-26T10:45:09+00:00\",\"dateModified\":\"2021-02-26T10:45:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#primaryimage\",\"url\":\"https:\/\/devopsnews.online\/wp-content\/uploads\/2021\/02\/adrien-olichon-gOdavfpH-3s-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/devopsnews.online\/wp-content\/uploads\/2021\/02\/adrien-olichon-gOdavfpH-3s-unsplash-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/devopsnews.online\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New research reveals more new cloud watering hole attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/devopsnews.online\/#website\",\"url\":\"https:\/\/devopsnews.online\/\",\"name\":\"DevOps Online North America\",\"description\":\"by 31 Media Ltd.\",\"publisher\":{\"@id\":\"https:\/\/devopsnews.online\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/devopsnews.online\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/devopsnews.online\/#organization\",\"name\":\"DevOps Online North America\",\"url\":\"https:\/\/devopsnews.online\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/devopsnews.online\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/devopsnews.online\/wp-content\/uploads\/2020\/03\/DevOpsOnline_email.png\",\"contentUrl\":\"https:\/\/devopsnews.online\/wp-content\/uploads\/2020\/03\/DevOpsOnline_email.png\",\"width\":198,\"height\":64,\"caption\":\"DevOps Online North America\"},\"image\":{\"@id\":\"https:\/\/devopsnews.online\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/DevOpsAmerica\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/devopsnews.online\/#\/schema\/person\/1183cef5fa13624c55f3faf81f391435\",\"name\":\"Yashesh Patel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/devopsnews.online\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7133dcc024275e35cf81ef202ce76441?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7133dcc024275e35cf81ef202ce76441?s=96&d=mm&r=g\",\"caption\":\"Yashesh Patel\"},\"sameAs\":[\"https:\/\/devopsnews.online\"],\"url\":\"https:\/\/devopsnews.online\/author\/yashesh-patel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New research reveals more new cloud watering hole attacks - DevOps Online North America","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/","og_locale":"en_US","og_type":"article","og_title":"New research reveals more new cloud watering hole attacks - DevOps Online North America","og_description":"New research from Accurics revealed an increased adoption of managed infrastructure services as well as a rise in new cloud watering hole attacks. Indeed, it was found out that 23% of attacks originated from poorly configured managed service offerings, which resulted from default security profiles or configurations. The report shows that attackers have increasingly strived...","og_url":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/","og_site_name":"DevOps Online North America","article_published_time":"2021-02-26T10:45:09+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/devopsnews.online\/wp-content\/uploads\/2021\/02\/adrien-olichon-gOdavfpH-3s-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Yashesh Patel","twitter_card":"summary_large_image","twitter_creator":"@DevOpsAmerica","twitter_site":"@DevOpsAmerica","twitter_misc":{"Written by":"Yashesh Patel","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#article","isPartOf":{"@id":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/"},"author":{"name":"Yashesh Patel","@id":"https:\/\/devopsnews.online\/#\/schema\/person\/1183cef5fa13624c55f3faf81f391435"},"headline":"New research reveals more new cloud watering hole attacks","datePublished":"2021-02-26T10:45:09+00:00","dateModified":"2021-02-26T10:45:09+00:00","mainEntityOfPage":{"@id":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/"},"wordCount":197,"publisher":{"@id":"https:\/\/devopsnews.online\/#organization"},"image":{"@id":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/devopsnews.online\/wp-content\/uploads\/2021\/02\/adrien-olichon-gOdavfpH-3s-unsplash-scaled.jpg","keywords":["Cloud","cyberattack","cybersecurity","data","security"],"articleSection":["News","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/","url":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/","name":"New research reveals more new cloud watering hole attacks - DevOps Online North America","isPartOf":{"@id":"https:\/\/devopsnews.online\/#website"},"primaryImageOfPage":{"@id":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#primaryimage"},"image":{"@id":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/devopsnews.online\/wp-content\/uploads\/2021\/02\/adrien-olichon-gOdavfpH-3s-unsplash-scaled.jpg","datePublished":"2021-02-26T10:45:09+00:00","dateModified":"2021-02-26T10:45:09+00:00","breadcrumb":{"@id":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#primaryimage","url":"https:\/\/devopsnews.online\/wp-content\/uploads\/2021\/02\/adrien-olichon-gOdavfpH-3s-unsplash-scaled.jpg","contentUrl":"https:\/\/devopsnews.online\/wp-content\/uploads\/2021\/02\/adrien-olichon-gOdavfpH-3s-unsplash-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/devopsnews.online\/new-research-reveals-more-new-cloud-watering-hole-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/devopsnews.online\/"},{"@type":"ListItem","position":2,"name":"New research reveals more new cloud watering hole attacks"}]},{"@type":"WebSite","@id":"https:\/\/devopsnews.online\/#website","url":"https:\/\/devopsnews.online\/","name":"DevOps Online North America","description":"by 31 Media Ltd.","publisher":{"@id":"https:\/\/devopsnews.online\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/devopsnews.online\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/devopsnews.online\/#organization","name":"DevOps Online North America","url":"https:\/\/devopsnews.online\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/devopsnews.online\/#\/schema\/logo\/image\/","url":"https:\/\/devopsnews.online\/wp-content\/uploads\/2020\/03\/DevOpsOnline_email.png","contentUrl":"https:\/\/devopsnews.online\/wp-content\/uploads\/2020\/03\/DevOpsOnline_email.png","width":198,"height":64,"caption":"DevOps Online North America"},"image":{"@id":"https:\/\/devopsnews.online\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/DevOpsAmerica"]},{"@type":"Person","@id":"https:\/\/devopsnews.online\/#\/schema\/person\/1183cef5fa13624c55f3faf81f391435","name":"Yashesh Patel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/devopsnews.online\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7133dcc024275e35cf81ef202ce76441?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7133dcc024275e35cf81ef202ce76441?s=96&d=mm&r=g","caption":"Yashesh Patel"},"sameAs":["https:\/\/devopsnews.online"],"url":"https:\/\/devopsnews.online\/author\/yashesh-patel\/"}]}},"_links":{"self":[{"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/posts\/23096"}],"collection":[{"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/users\/123458"}],"replies":[{"embeddable":true,"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/comments?post=23096"}],"version-history":[{"count":1,"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/posts\/23096\/revisions"}],"predecessor-version":[{"id":23098,"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/posts\/23096\/revisions\/23098"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/media\/23097"}],"wp:attachment":[{"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/media?parent=23096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/categories?post=23096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/tags?post=23096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}