Call a Specialist Today! 844-294-0778




Unit 42 Cloud Threat Report, Volume 7

Navigating the expanding attack surface.

Don't Let Today's Security Gap Become Tomorrow's Headline




While cloud technology is not new, and many organizations have been on the cloud journey for years, cloud service providers continue evolving with new features and services.

The fast change and growth make it difficult for organizations to catch up, and, as a result, many inadvertently introduce security weaknesses into their environments.

In its annual Cloud Threat Report, Unit 42™ analyzed workloads in 210,000 cloud accounts across 1,300 different organizations. Read the findings


Learn how to close the security gap:

Brief Summary

  • Threat actors are getting smarter and more powerful every day.
    They're learning from new security strategies and finding creative ways to work around them, exploiting hidden weak spots and using vulnerabilities to their advantage.
  • MFA is not enforced for cloud users.
    76% of organizations don't enforce MFA for console users, and 58% of organizations don't enforce MFA for root/admin users.
  • Attacks on software supply chains are on the rise.
    The prevalence of open-source usage and the complexity of software dependency make securing the software supply chain difficult.
  • Unpatched vulnerabilities continue to be low-hanging fruit for attacks.
    63% of the codebases in production have unpatched vulnerabilities rated high or critical (CVSS >= 7.0), and 11% of the hosts exposed in public clouds have high or critical vulnerabilities.

The Highlights of the Study

What we learned throughout our research is that threat actors have become masters at exploiting common oversights in cloud security.

Get the report to learn about the greatest risks to your cloud environment and how to manage them effectively. You'll also:

  • Learn lessons from real cloud breach incidents.
  • Get tips to stay ahead of cloud threat actors.
  • Address the most common cloud security issues.
  • Discover the impacts and risks of open-source software in the cloud.

Short on time?



How Can PaloGuard Help? Solutions we Offer:

Palo Alto Networks Prisma Cloud

Prisma Cloud is a cloud-native application protection platform (CNAPP) that protects code, infrastructure, workloads, data, and applications across multicloud and hybrid cloud environments.



Palo Alto Networks Unit 42 Incident Response

Unit 42 incident response experts utilize cloud technologies, including Cortex XDR, Cortex Xpanse, and Prisma Cloud, to discover attack vectors, identify the extent of access and the data at risk, and take appropriate remediation actions.



Palo Alto Networks Cortex Data Lake

Cortex Data Lake is scalable cloud-based storage that collects, integrates, and normalizes enterprises’ security data combined with multiple sources of threat intelligence. Cortex Data Lake enables largescale, AI-based analytics to identify and stop the most sophisticated attacks.






Want to learn more? We're here to help.

See how Palo Alto Networks can increase your security and regulate your network traffic. Contact Us to get started!