{"id":44217,"date":"2021-12-01T16:06:05","date_gmt":"2021-12-01T16:06:05","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32872\/These-Researchers-Wanted-To-Test-Cloud-Security.-They-Were-Shocked-By-What-They-Found.html"},"modified":"2021-12-01T16:06:05","modified_gmt":"2021-12-01T16:06:05","slug":"these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/","title":{"rendered":"These Researchers Wanted To Test Cloud Security. They Were Shocked By What They Found"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/d8a4561bd603e904bb24700fb3fb97cb37cc5f4e\/2021\/08\/25\/99bd596a-6b7d-47a5-9d50-5726551168c3\/getty-hands-typing-on-a-laptop-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>Insecure cloud-computing services can be a huge risk for organisations because they&#8217;re a regular target for cyber criminals. Researchers have demonstrated how&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/cloud-security-in-2021-a-business-guide-to-essential-tools-and-best-practices\/\" target=\"_blank\" rel=\"noopener\">vulnerable or misconfigured cloud services<\/a>&nbsp;can be, after deploying hundreds of honeypots designed to look like insecure infrastructure, some of which lasted just minutes before being compromised by hackers. <\/p>\n<p><a href=\"https:\/\/unit42.paloaltonetworks.com\/exposed-services-public-clouds\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Cybersecurity researchers at Palo Alto Networks<\/a>&nbsp;set up a honeypot compromised of 320 nodes around the world, made up of multiple misconfigured instances of common cloud services, including remote desktop protocol (RDP), secure shell protocol (SSH), server message block (SMB) and Postgres databases.&nbsp; <\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">ZDNet Recommends<\/span> <\/h3>\n<\/p><\/div>\n<p>The honeypot also included&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/these-are-the-terrible-passwords-that-people-are-still-using-heres-how-to-do-better\/\" target=\"_blank\" rel=\"noopener\">accounts configured to have default or weak passwords<\/a>&nbsp;&#8212; exactly the sort of things that cyber criminals are looking for when trying to breach networks.&nbsp; <\/p>\n<p><strong>SEE<\/strong>:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/cloud-security-in-2021-a-business-guide-to-essential-tools-and-best-practices\/\"><strong>Cloud security in 2021: A business guide to essential tools and best practices<\/strong><\/a> <\/p>\n<p>And it wasn&#8217;t long before cyber criminals discovered the honeypot and looked to exploit it &#8212; some of the sites were compromised in minutes while 80% of the 320 honeypots were compromised within 24 hours. All of them had been compromised within a week.&nbsp; <\/p>\n<p>The most attacked application was secure shell, which is a network communication protocol that enables two machines to communicate. Each SSH honeypot was compromised 26 times a day on average. The most attacked honeypot was compromised a total of 169 times in just a single day.&nbsp; <\/p>\n<p>Meanwhile, one attacker compromised 96% of the 80 Postgres honeypots within a single 90-second period.&nbsp; <\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>&#8220;The speed of vulnerability management is usually measured in days or months. The fact that attackers could find and compromise our honeypots in minutes was shocking. This research demonstrates the risk of insecurely exposed services,&#8221; said Jay Chen, principal cloud security researcher at Palo Alto Networks.&nbsp; <\/p>\n<p>Exposed or poorly configured cloud services like those deployed in the honeypot make tempting targets for cyber criminals of all kinds. &nbsp; <\/p>\n<p>Several notorious&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/have-we-reached-peak-ransomware-how-the-internets-biggest-security-problem-has-grown-and-what-happens-next\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a>&nbsp;operations are known to&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-vs-wfh-how-remote-working-is-making-cyberattacks-easier-to-pull-off\/\" target=\"_blank\" rel=\"noopener\">exploit exposed cloud services<\/a>&nbsp;to gain initial access to the victim&#8217;s network in order to eventually encrypt as much as possible and demand a multi-million dollar ransom in exchange for the decryption key.&nbsp;<strong>&nbsp;<\/strong> <\/p>\n<p>Meanwhile,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/microsoft-office-365-is-becoming-the-core-of-many-businesses-and-hackers-have-noticed\/\" target=\"_blank\" rel=\"noopener\">nation state-backed hacking groups are also known to target vulnerabilities in cloud services<\/a>&nbsp;as stealthy means of entering networks in order to conduct espionage, steal data, or deploy malware without detection.&nbsp; <\/p>\n<p><strong>SEE:&nbsp;<\/strong><a href=\"http:\/\/www.zdnet.com\/topic\/a-winning-strategy-for-cybersecurity\/\" target=\"_blank\" rel=\"noopener\"><strong>A winning strategy for cybersecurity<\/strong><\/a><strong>&nbsp;(ZDNet special report)<\/strong> <\/p>\n<p>And as the research demonstrates, it doesn&#8217;t take long for cyber criminals to find exposed internet-facing systems.&nbsp; <\/p>\n<p>&#8220;When a vulnerable service is exposed to the internet, opportunistic attackers can find and attack it in just a few minutes. As most of these internet-facing services are connected to some other cloud workloads, any breached service can potentially lead to the compromise of the entire cloud environment,&#8221; said Chen. &nbsp; <\/p>\n<p>When it comes to securing accounts used to access cloud services, organisations should avoid using default passwords and users should be provided with&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/multi-factor-authentication-use-it-for-all-the-people-that-access-your-network-all-the-time\/\" target=\"_blank\" rel=\"noopener\">multi-factor authentication<\/a>&nbsp;to create an extra barrier to prevent leaked credentials being exploited. &nbsp; <\/p>\n<p>It&#8217;s also vital for organisations to apply security patches when they&#8217;re available in order to prevent cyber criminals from taking advantage of known exploits &#8212;&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/many-organisations-dont-know-how-to-manage-vpn-security-properly-and-cyber-criminals-are-taking-advantage\/\" target=\"_blank\" rel=\"noopener\">and it&#8217;s a strategy that applies to cloud applications, too<\/a>. &nbsp; <\/p>\n<p>&#8220;The outcome [of the research] reiterates the importance of mitigating and patching security issues quickly. When a misconfigured or vulnerable service is exposed to the internet, it takes attackers just a few minutes to discover and compromise the service. There is no margin of error when it comes to the timing of security fixes,&#8221; said Chen.&nbsp; <\/p>\n<h3> <strong>MORE ON CYBERSECURITY<\/strong> <\/h3>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32872\/These-Researchers-Wanted-To-Test-Cloud-Security.-They-Were-Shocked-By-What-They-Found.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[145],"class_list":["post-44217","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackerdata-lossflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>These Researchers Wanted To Test Cloud Security. They Were Shocked By What They Found 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"These Researchers Wanted To Test Cloud Security. They Were Shocked By What They Found 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-01T16:06:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/d8a4561bd603e904bb24700fb3fb97cb37cc5f4e\/2021\/08\/25\/99bd596a-6b7d-47a5-9d50-5726551168c3\/getty-hands-typing-on-a-laptop-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"These Researchers Wanted To Test Cloud Security. They Were Shocked By What They Found\",\"datePublished\":\"2021-12-01T16:06:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/\"},\"wordCount\":636,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/d8a4561bd603e904bb24700fb3fb97cb37cc5f4e\/2021\/08\/25\/99bd596a-6b7d-47a5-9d50-5726551168c3\/getty-hands-typing-on-a-laptop-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"keywords\":[\"headline,hacker,data loss,flaw\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/\",\"name\":\"These Researchers Wanted To Test Cloud Security. They Were Shocked By What They Found 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/d8a4561bd603e904bb24700fb3fb97cb37cc5f4e\/2021\/08\/25\/99bd596a-6b7d-47a5-9d50-5726551168c3\/getty-hands-typing-on-a-laptop-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2021-12-01T16:06:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#primaryimage\",\"url\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/d8a4561bd603e904bb24700fb3fb97cb37cc5f4e\/2021\/08\/25\/99bd596a-6b7d-47a5-9d50-5726551168c3\/getty-hands-typing-on-a-laptop-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/d8a4561bd603e904bb24700fb3fb97cb37cc5f4e\/2021\/08\/25\/99bd596a-6b7d-47a5-9d50-5726551168c3\/getty-hands-typing-on-a-laptop-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,data loss,flaw\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerdata-lossflaw\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"These Researchers Wanted To Test Cloud Security. They Were Shocked By What They Found\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"These Researchers Wanted To Test Cloud Security. They Were Shocked By What They Found 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/","og_locale":"en_US","og_type":"article","og_title":"These Researchers Wanted To Test Cloud Security. They Were Shocked By What They Found 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-01T16:06:05+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/d8a4561bd603e904bb24700fb3fb97cb37cc5f4e\/2021\/08\/25\/99bd596a-6b7d-47a5-9d50-5726551168c3\/getty-hands-typing-on-a-laptop-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"These Researchers Wanted To Test Cloud Security. They Were Shocked By What They Found","datePublished":"2021-12-01T16:06:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/"},"wordCount":636,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/d8a4561bd603e904bb24700fb3fb97cb37cc5f4e\/2021\/08\/25\/99bd596a-6b7d-47a5-9d50-5726551168c3\/getty-hands-typing-on-a-laptop-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","keywords":["headline,hacker,data loss,flaw"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/","url":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/","name":"These Researchers Wanted To Test Cloud Security. They Were Shocked By What They Found 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/d8a4561bd603e904bb24700fb3fb97cb37cc5f4e\/2021\/08\/25\/99bd596a-6b7d-47a5-9d50-5726551168c3\/getty-hands-typing-on-a-laptop-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2021-12-01T16:06:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/d8a4561bd603e904bb24700fb3fb97cb37cc5f4e\/2021\/08\/25\/99bd596a-6b7d-47a5-9d50-5726551168c3\/getty-hands-typing-on-a-laptop-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/d8a4561bd603e904bb24700fb3fb97cb37cc5f4e\/2021\/08\/25\/99bd596a-6b7d-47a5-9d50-5726551168c3\/getty-hands-typing-on-a-laptop-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/these-researchers-wanted-to-test-cloud-security-they-were-shocked-by-what-they-found\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,data loss,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerdata-lossflaw\/"},{"@type":"ListItem","position":3,"name":"These Researchers Wanted To Test Cloud Security. They Were Shocked By What They Found"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44217"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44217\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}