{"id":36458,"date":"2020-08-05T15:18:44","date_gmt":"2020-08-05T15:18:44","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31460\/Misconfigured-Servers-Contributed-To-More-Than-200-Cloud-Breaches.html"},"modified":"2020-08-05T15:18:44","modified_gmt":"2020-08-05T15:18:44","slug":"misconfigured-servers-contributed-to-more-than-200-cloud-breaches","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/","title":{"rendered":"Misconfigured Servers Contributed To More Than 200 Cloud Breaches"},"content":{"rendered":"<div class=\"wysiwyg\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/08\/GettyImages-671033080-e1596646560422-1024x614.jpg\" alt class=\"wp-image-106600\" srcset=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/08\/GettyImages-671033080-e1596646560422-1024x614.jpg 1024w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/08\/GettyImages-671033080-e1596646560422-300x180.jpg 300w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/08\/GettyImages-671033080-e1596646560422-768x460.jpg 768w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/08\/GettyImages-671033080-e1596646560422-860x515.jpg 860w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/08\/GettyImages-671033080-e1596646560422-156x93.jpg 156w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/08\/GettyImages-671033080-e1596646560422-312x187.jpg 312w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/08\/GettyImages-671033080-e1596646560422-640x384.jpg 640w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/08\/GettyImages-671033080-e1596646560422-1280x767.jpg 1280w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/08\/GettyImages-671033080-e1596646560422.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\"><figcaption>Staff work in a data center and server farm in Meyrin, Switzerland. (Dean Mouhtaropoulos\/Getty Images)<\/figcaption><\/figure>\n<p>Misconfigured storage services in 93 percent of cloud deployments have contributed to more than 200 breaches over the past two years, exposing more than 30 billion records, according to a report from Accurics, which predicted that cloud breaches are likely to increase in both velocity and scale.<\/p>\n<p>The researchers <a href=\"https:\/\/bit.ly\/2BNuFxr\">found<\/a> that 91 percent of the cloud deployments analyzed had at least one major exposure that left a security group wide open while in 50 percent unprotected credentials were stored in container configuration files, significant because 84 percent of organizations use containers.<\/p>\n<p>\u201cWhile the adoption of cloud native infrastructure such as containers, serverless, and servicemesh is fueling innovation, <a href=\"https:\/\/www.scmagazine.com\/?s=misconfigured+servers&amp;orderby=date&amp;order=desc\">misconfigurations<\/a> are becoming commonplace and creating serious risk exposure for organizations,\u201d said Accurics Co-founder and CTO Om Moolchandani.<\/p>\n<p>Private credentials with high privileges were embedded in the code in deployments at 41 percent of the organizations that responded to researchers. In 100 percent of deployments, an altered routing rule exposed a private subnet containing sensitive resources such as databases to the internet.<\/p>\n<p>Respondents do not liberally apply automation, even as a manual approach creates alert fatigue \u2013 only six percent of cloud-security risks are being addressed by automated technology, the report found. And, hardcoded keys are present in 72 percent of deployments.<\/p>\n<p>\u201cThe high percentage of cloud deployments with network exposure is concerning but not a surprise,\u201d commented Brian Soby, CTO and co-founder of&nbsp;AppOmni.<\/p>\n<p>\u201cIn more than 95 percent of [the] risk assessments [AppOmni conducts], we find exposures of highly sensitive data (frequently including insecurely stored credentials) to the public internet or high-risk \/ low-privilege users such as BPOs or vendor integrations,\u201d Soby said. \u201cSo, seeing those statistics closely align isn\u2019t surprising.\u201d<\/p>\n<p>Chris Morales, head of security analytics at&nbsp;Vectra, said the findings were believable.<\/p>\n<p>\u201cCloud capabilities are developed at a rapid pace and it is near impossible for anyone to keep up with all of those features and capabilities and the impact they have on data access,\u201d Morales said. \u201cMuch of the problem is due to lack of understanding to how cloud configuration works and the potential pitfalls by an industry historically versed in securing access to physical systems.\u201d<\/p>\n<p>While errors and misconfigurations exist in physical data centers, they are hidden behind a layer of controls and segregation from external factors. \u201cIn the cloud, we strip that layer away and a few keystrokes can unintentionally take a system from internal only to external facing,\u201d Morales explained.<\/p>\n<p>Any massive cloud security breach signifies a larger impact footprint or blast-radius.&nbsp;<\/p>\n<p>\u201cI do believe such events will become more and more prevalent as the adoption of public cloud continues with individuals and companies taking a short cut approach to meet time-to-market deadlines, without executing on the shared security model of the public cloud,\u201d said Rajiv Kanaujia, vice president of operations at CloudCheckr.<\/p>\n<p>Over time, IaaS vendors will make certain areas of security non-negotiable, hence restricting the success of the bad-actors, but a lack of awareness or funding to execute on the shared security model of the public cloud will continue to expose customers to such vulnerabilities, Kanaujia said.<\/p>\n<p>\u201cNow, the IaaS consumer (user of the cloud) has a big role to play in configuring and managing these layers,\u201d he said, noting that application developers never had to deal with such responsibilities in the past.<br \/>Kanaujia agreed that a better approach is moving towards <a href=\"https:\/\/www.scmagazine.com\/?s=IAC\">Infrastructure as Code<\/a> (IAC), where such configuration changes become transparent to internal teams and go through a better change management process, including peer review. The industry will encourage concepts like encrypted data-bags that will slowly eliminate the need for having credentials in clear text anywhere in the system, he added.<\/p>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31460\/Misconfigured-Servers-Contributed-To-More-Than-200-Cloud-Breaches.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36459,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8843],"class_list":["post-36458","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackeramazondata-lossflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Misconfigured Servers Contributed To More Than 200 Cloud Breaches 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Misconfigured Servers Contributed To More Than 200 Cloud Breaches 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-05T15:18:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"614\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Misconfigured Servers Contributed To More Than 200 Cloud Breaches\",\"datePublished\":\"2020-08-05T15:18:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\\\/\"},\"wordCount\":628,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches.jpg\",\"keywords\":[\"headline,hacker,amazon,data loss,flaw\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\\\/\",\"name\":\"Misconfigured Servers Contributed To More Than 200 Cloud Breaches 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches.jpg\",\"datePublished\":\"2020-08-05T15:18:44+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches.jpg\",\"width\":1024,\"height\":614},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,amazon,data loss,flaw\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackeramazondata-lossflaw\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Misconfigured Servers Contributed To More Than 200 Cloud Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Misconfigured Servers Contributed To More Than 200 Cloud Breaches 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/","og_locale":"en_US","og_type":"article","og_title":"Misconfigured Servers Contributed To More Than 200 Cloud Breaches 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-08-05T15:18:44+00:00","og_image":[{"width":1024,"height":614,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Misconfigured Servers Contributed To More Than 200 Cloud Breaches","datePublished":"2020-08-05T15:18:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/"},"wordCount":628,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches.jpg","keywords":["headline,hacker,amazon,data loss,flaw"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/","url":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/","name":"Misconfigured Servers Contributed To More Than 200 Cloud Breaches 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches.jpg","datePublished":"2020-08-05T15:18:44+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches.jpg","width":1024,"height":614},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/misconfigured-servers-contributed-to-more-than-200-cloud-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,amazon,data loss,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackeramazondata-lossflaw\/"},{"@type":"ListItem","position":3,"name":"Misconfigured Servers Contributed To More Than 200 Cloud Breaches"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36458"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36458\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36459"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}