{"id":1481,"date":"2025-05-20T08:00:00","date_gmt":"2025-05-20T15:00:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=1481"},"modified":"2025-10-03T23:09:51","modified_gmt":"2025-10-04T06:09:51","slug":"and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/","title":{"rendered":"And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets"},"content":{"rendered":"\n<p>We admit it \u2013 we\u2019ve had our heads in the clouds recently. Since we started working with <a href=\"https:\/\/www.cycognito.com\/news\/press-releases\/cycognito-joins-wiz-integrations-win-platform.php\">Wiz<\/a> as one of their integration partners, we\u2019ve been spending even more time thinking about cloud assets. And these assets are everywhere!&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2024-11-19-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-total-723-billion-dollars-in-2025\">Gartner<\/a> predicts double digit growth across all cloud segments in 2025. More and more organizations are adopting multi-cloud strategies that spread their assets across multiple hosting providers and more and more IT infrastructure spending is shifting from on-premise hosting to cloud.&nbsp;<\/p>\n\n\n\n<p>While cloud computing has many benefits, we\u2019re also seeing an increasing number of serious security issues directly affecting cloud assets. We\u2019re not the only ones noticing this trend \u2013 researchers with Palo Alto Networks found that by the end of 2024, organizations suffered a <a href=\"https:\/\/www.darkreading.com\/cyber-risk\/high-severity-cloud-security-alerts-tripled-2024\">388%<\/a> increase in cloud security alerts compared to 2023.&nbsp;<\/p>\n\n\n\n<p>Given our new <a href=\"https:\/\/www.cycognito.com\/blog\/black-box-discovery-and-dast-cycognitos-integration-with-wiz\/\">partnership with Wiz<\/a>, we wanted to do a dive into some of the data we have about the cloud assets CyCognito monitors \u2013 where they live, what issues they may be hiding, and what techniques can make them safer.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Before we jump in, it\u2019s worth noting that this research is not specific to the cloud platforms themselves, but rather the assets hosted on them. While we aggregated assets by cloud hosting providers, further research is needed to understand why variance existed between different populations of assets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What we looked into<\/h2>\n\n\n\n<p>For this research, we were primarily interested in assets hosted by the three largest cloud service providers \u2013 AWS, Azure, and Google Cloud \u2013 but also looked at aggregated figures for other clouds and hosting providers.&nbsp;<\/p>\n\n\n\n<p>We also looked at whether the cloud assets we saw were vulnerable to any vulnerabilities or misconfigurations and whether any of those vulnerabilities were of critical severity (defined as a Common Vulnerability Scoring System [CVSS] score of 9 or higher on a scale of 1.0 to 10.0). These vulnerabilities affect the asset, not the hosting providers.&nbsp;<\/p>\n\n\n\n<p>Looking at anonymized, aggregated data across the nearly five million internet-exposed assets that CyCognito monitors, we\u2019ve found that 1 in 3 easily exploitable vulnerabilities or misconfigurations are found on cloud assets.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1100\" height=\"500\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-cloud-platform-issues-2.webp\" alt=\"\" class=\"wp-image-1496\" style=\"width:712px;height:auto\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-cloud-platform-issues-2.webp 1100w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-cloud-platform-issues-2-512x233.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-cloud-platform-issues-2-768x349.webp 768w\" sizes=\"auto, (max-width: 1100px) 100vw, 1100px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p>Our research shows that among the three cloud hosting providers, Google Cloud hosted the highest percentage of assets affected by at least one vulnerability or misconfiguration (38%), over 2.5x more than AWS (15%). Assets hosted by Azure ranked second in total exposure (27%). When we looked at assets hosted by other clouds and hosting providers like GoDaddy, Hetzner, and Digital Ocean aggregated together, 38% of assets found on other clouds were vulnerable to at least one vulnerability or misconfiguration and 32% of assets attributed to hosting providers were vulnerable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Critical issues<\/h2>\n\n\n\n<p>Critical vulnerabilities and misconfigurations (CVSS 9.0 or higher) are uncommon across all environments we looked at. However, small numbers can still have gulfs between them. We found that assets hosted in Azure showed a slightly higher percentage of critical vulnerabilities (less than 0.07%) than both assets hosted in AWS and in Google Cloud (0.04%). Although these numbers are small, across attack surfaces of hundreds of thousands to millions of assets, this could represent hundreds of potential weak points \u2013 and it only takes one to let an attacker in.&nbsp;<\/p>\n\n\n\n<p>Comparatively, 0.48% of assets attributed to other cloud providers and 0.32% of assets attributed to other hosting providers were affected by critical vulnerabilities. While still less than 1%, the percentage of total affected assets hosted by other cloud providers was approximately 10 times higher than with AWS or Google Cloud.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Low-hanging fruit<\/h2>\n\n\n\n<p>While the CVSS is an essential starting point for evaluating the severity of security issues, it is merely a starting point. Our research for the 2024 edition of <a href=\"https:\/\/www.cycognito.com\/resources\/reports\/cycognito-state-of-external-exposure-management-2024\/\">CyCognito\u2019s State of External Exposure Management report<\/a> found that incorporating additional context about the affected asset and attack surface, like the discoverability or attractiveness of the asset to attackers, identified one in three (32%) security issues as less severe than their CVSS score would indicate.&nbsp;<\/p>\n\n\n\n<p>Because of this, we also looked specifically for cloud assets with vulnerabilities that were easily exploitable, even if those vulnerabilities weren\u2019t critical. CyCognito uses available threat intelligence on attacker behavior and trends, along with details about vulnerabilities, to measure the difficulty at which a vulnerable asset can be assessed and consequently exploited by a potential attacker, based on the complexity of the required exploitation methods.<\/p>\n\n\n\n<p>Easily exploitable vulnerabilities were most commonly found on assets hosted by \u201cother clouds\u201d and \u201cother hosting providers\u201d \u2013&nbsp; over 13% and 10% of assets, respectively.&nbsp;<\/p>\n\n\n\n<p>Assets hosted by Google Cloud also had approximately double the percentage of easily exploitable vulnerabilities compared to assets hosted by AWS and Azure, with 5% of assets hosted by&nbsp; Google Cloud having easily exploitable vulnerabilities or misconfigurations compared with 2% of AWS-hosted assets and 2% of assets hosted in Azure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Combined risk factors<\/h2>\n\n\n\n<p>Not all critical issues are easily exploitable and not all easily exploitable issues are critical. But when we look at the assets that are affected by issues that are both critical and easily exploitable, we see that assets residing in AWS are the least affected by these types of issues \u2013 less than a tenth of one percent of assets hosted by AWS have easily exploitable critical issues. The figures for Azure and Google Cloud are similar.&nbsp;<\/p>\n\n\n\n<p>However, while it\u2019s still true that less than 1% of assets hosted by other clouds or hosting providers are affected by easily exploitable critical issues, these issues can be found at ten times the frequency there than on AWS assets.<\/p>\n\n\n\n<table class=\"alternating\">\n\n<colgroup class=\"fivecolumns\">\n<col id=\"column1\"><\/col>\n<col id=\"column2\"><\/col>\n<col id=\"column3\"><\/col>\n<col id=\"column4\"><\/col>\n<col id=\"column5\"><\/col>\n<\/colgroup>\n\n<tbody>\n<tr>\n<th class=\"small\"><\/th>\n<th class=\"small\">% Assets with at least One Issue<\/th>\n<th class=\"small\">Assets with Critical Issues<\/th>\n<th class=\"small\">Assets with Easily Exploitable Issues<\/th>\n<th class=\"small\">Assets with Critical &#038; Easily Exploitable Issues<\/th>\n<\/tr>\n\n<tr>\n<td><strong>Amazon Web Services (AWS)<\/strong><\/td>\n<td>14.77%<\/td>\n<td>0.04%<\/td>\n<td>1.98%<\/td>\n<td>0.02%<\/td>\n<\/tr>\n\n<tr>\n<td><strong>Microsoft Azure<\/strong><\/td>\n<td>26.98%<\/td>\n<td>0.07%<\/td>\n<td>2.37%<\/td>\n<td>0.05%<\/td>\n<\/tr>\n\n<tr>\n<td><strong>Google Cloud Platform (GCP)<\/strong><\/td>\n<td>38.15%<\/td>\n<td>0.04%<\/td>\n<td>5.35%<\/td>\n<td>0.03%<\/td>\n<\/tr>\n\n<tr>\n<td><strong>Other Clouds<\/strong><\/td>\n<td>38.15%<\/td>\n<td>0.48%<\/td>\n<td>12.72%<\/td>\n<td>0.30%<\/td>\n<\/tr>\n\n<tr>\n<td><strong>Hosting Providers<\/strong><\/td>\n<td>32.93%<\/td>\n<td>0.32%<\/td>\n<td>9.73%<\/td>\n<td>0.25%<\/td>\n<\/tr>\n\n<\/tbody>\n<\/table>\n\n\n\n<h2 class=\"wp-block-heading\">Great data, but now what?&nbsp;<\/h2>\n\n\n\n<p>Now, we&#8217;re not suggesting everyone go back to on-premises \u2013 cloud is here to stay. Instead, security teams should focus on understanding the exposures and risks affecting cloud assets.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Complete visibility<\/strong>: Multi-cloud environments can lead to forgotten assets and contribute to Shadow IT. Ensure that your asset inventory is up-to-date by using an asset discovery solution that doesn\u2019t rely on potentially outdated or inaccurate inventory information. Seedless discovery solutions don\u2019t rely on what you know to find what missing or forgotten assets.\u00a0<\/li>\n\n\n\n<li><strong>Use dedicated cloud security tools: <\/strong>Cloud-Native Application Protection Platforms (CNAPPs), <a href=\"https:\/\/www.cycognito.com\/blog\/black-box-discovery-and-dast-cycognitos-integration-with-wiz\/\">like our friends at Wiz<\/a>, integrate multiple tools that scan code, check open-source libraries, secure cloud workloads, and track cloud configurations.<\/li>\n<\/ol>\n\n\n\n<p><strong>But make sure to close security gaps: <\/strong>In addition to testing during development, make sure you\u2019re testing your cloud applications after they\u2019re deployed. Dynamic application security testing (DAST) is crucial for AppSec as it actively tests live applications, uncovering vulnerabilities and misconfigurations that static tools miss.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Worried about vulnerabilities affecting your cloud assets?&nbsp;<\/h2>\n\n\n\n<p>If you\u2019re already using Wiz, CyCognito\u2019s Wiz integration can <a href=\"https:\/\/www.cycognito.com\/solutions\/cnapp.php\">enhance your CNAPP coverage<\/a> by:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enriching Wiz with active and passive test results<\/li>\n\n\n\n<li>Filling visibility gaps across sanctioned and unsanctioned cloud assets<\/li>\n\n\n\n<li>Providing an attacker\u2019s outside-in perspective<\/li>\n\n\n\n<li>Improving overall visibility, threat detection, and incident response workflows.<\/li>\n<\/ul>\n\n\n\n<p>If you want to better discover and test your cloud assets but don\u2019t know where to start, request a <a href=\"https:\/\/www.cycognito.com\/demo\/\">customized demo<\/a>.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud assets are increasingly vulnerable, now accounting for one-third of all easily exploitable security issues. Organizations using multi-cloud environments\u2014especially outside the major providers\u2014face significantly higher exposure to both critical and easily exploitable risks. To manage this growing threat, businesses need full visibility into their external attack surfaces and should adopt proactive, automated platforms like CyCognito to detect and remediate vulnerabilities quickly. <\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[229,3],"tags":[105,234,233,237,236],"class_list":["post-1481","post","type-post","status-publish","format-standard","hentry","category-featured","category-research","tag-cloud-security","tag-cloud-native","tag-cnapp","tag-multi-cloud","tag-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"Cloud risks are rising fast\u20141 in 3 issues are on cloud assets. Full visibility and proactive security are key to reducing exposure and response time.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets\" \/>\n<meta property=\"og:description\" content=\"Cloud risks are rising fast\u20141 in 3 issues are on cloud assets. Full visibility and proactive security are key to reducing exposure and response time.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-20T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-04T06:09:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2025-04-29-2400x1256-email.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Emma Zaballos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Zaballos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/\"},\"author\":{\"name\":\"Emma Zaballos\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\"},\"headline\":\"And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets\",\"datePublished\":\"2025-05-20T15:00:00+00:00\",\"dateModified\":\"2025-10-04T06:09:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/\"},\"wordCount\":1194,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-cloud-platform-issues-2.webp\",\"keywords\":[\"Cloud Security\",\"cloud-native\",\"CNAPP\",\"Multi-cloud\",\"Vulnerabilities\"],\"articleSection\":[\"Featured\",\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/\",\"name\":\"And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-cloud-platform-issues-2.webp\",\"datePublished\":\"2025-05-20T15:00:00+00:00\",\"dateModified\":\"2025-10-04T06:09:51+00:00\",\"description\":\"Cloud risks are rising fast\u20141 in 3 issues are on cloud assets. Full visibility and proactive security are key to reducing exposure and response time.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-cloud-platform-issues-2.webp\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-cloud-platform-issues-2.webp\",\"width\":1100,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\",\"name\":\"Emma Zaballos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"caption\":\"Emma Zaballos\"},\"description\":\"Product Marketing Manager\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets | CyCognito Blog","description":"Cloud risks are rising fast\u20141 in 3 issues are on cloud assets. Full visibility and proactive security are key to reducing exposure and response time.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/","og_locale":"en_US","og_type":"article","og_title":"And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets","og_description":"Cloud risks are rising fast\u20141 in 3 issues are on cloud assets. Full visibility and proactive security are key to reducing exposure and response time.","og_url":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/","og_site_name":"CyCognito Blog","article_published_time":"2025-05-20T15:00:00+00:00","article_modified_time":"2025-10-04T06:09:51+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2025-04-29-2400x1256-email.png","type":"image\/png"}],"author":"Emma Zaballos","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emma Zaballos","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/"},"author":{"name":"Emma Zaballos","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58"},"headline":"And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets","datePublished":"2025-05-20T15:00:00+00:00","dateModified":"2025-10-04T06:09:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/"},"wordCount":1194,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-cloud-platform-issues-2.webp","keywords":["Cloud Security","cloud-native","CNAPP","Multi-cloud","Vulnerabilities"],"articleSection":["Featured","Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/","url":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/","name":"And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-cloud-platform-issues-2.webp","datePublished":"2025-05-20T15:00:00+00:00","dateModified":"2025-10-04T06:09:51+00:00","description":"Cloud risks are rising fast\u20141 in 3 issues are on cloud assets. Full visibility and proactive security are key to reducing exposure and response time.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-cloud-platform-issues-2.webp","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/illus-cloud-platform-issues-2.webp","width":1100,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/and-the-cloud-goes-wild-looking-at-vulnerabilities-in-cloud-assets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58","name":"Emma Zaballos","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","caption":"Emma Zaballos"},"description":"Product Marketing Manager","url":"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=1481"}],"version-history":[{"count":12,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1481\/revisions"}],"predecessor-version":[{"id":1557,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1481\/revisions\/1557"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=1481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=1481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=1481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}