Report finds web application attacks are still unduly high across cloud services
A new report from security firm tCell Inc. has found that web application attacks are still unduly high across Amazon Web Services Inc., Google Cloud and Microsoft Azure instances.
The Security Report for Web Applications Q2 2018 evaluated 316 million security incidents concluding that attacks against the application are growing in volume and sophistication. As a result, they continue to be a major threat to business.
Of the attacks, the research found that XSS, SQL injection, automated threats, file path traversals and command injection were now the most common types of security attacks. That’s a change from findings published in the Open Web Application Security Project Top 10 list of web application threats and security flaws.
The report noted that difference between the two findings is that tCell protects applications in-production that reside in the AWS, Azure and Google cloud environments, proving a “unique perspective on application security in production and the nature of the attacks themselves.”
Web application developers are doing themselves no favors in terms of implementing best practice with the report finding that 90 percent of active applications use libraries with a known Common Vulnerabilities and Exposures listing, with 30 percent more using a library with a critical CVE.
Patching was no better, with critical CVEs taking on average of 34 days to be patched, only four days faster than the average time to patch overall regardless of severity.
“Real-world web apps are under constant attack,” Michael Feiertag, chief executive officer of tCell, said in a statement. “For security operations teams, finding the successful attack amidst all the noise is like finding a needle in a haystack of needles. Improving visibility and reducing the resource strain that these attacks put on the system are the reasons why companies are deploying runtime application self-protection technology. It is imperative that secure coding practices become a critical part of the larger landscape in order to stop vulnerabilities at the source, but even more important is the ability to protect these applications once they have moved out of the testing environment and into production.”
Image: Maxpixel
Since you’re here …
… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.