{"id":44793,"date":"2022-01-13T18:30:02","date_gmt":"2022-01-13T18:30:02","guid":{"rendered":"https:\/\/www.darkreading.com\/cloud\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud"},"modified":"2022-01-13T18:30:02","modified_gmt":"2022-01-13T18:30:02","slug":"new-vulnerabilities-highlight-risks-of-trust-in-public-cloud","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/","title":{"rendered":"New Vulnerabilities Highlight Risks of Trust in Public Cloud"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5ec1ae6fe5a690f1\/61e045df60444b75b6392322\/orca_security_aws_superglue_attack_flow.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Amazon Web Services has closed two vulnerabilities in its core services, one of which could have allowed any user to access and take control of any company&#8217;s infrastructure, cloud security firm Orca Security said in an analysis published on Jan. 13. <\/p>\n<p>While the vulnerabilities are now fixed, the attack chain that involves&nbsp;compromising a core service, escalating privileges, and using that privilege to attack other users is not limited to Amazon. This method&nbsp;affects many other cloud vendors, says Yoav Alon, chief technology officer at Orca Security. At the heart of the problem is a lack of isolation between services and too little granularity in the permissions of different services and users, he says.<\/p>\n<p>The company has already reported similar issues to other cloud services, but Alon would not give specifics about those vulnerabilities until the company&#8217;s disclosure process is complete.<\/p>\n<p>&#8220;We believe that these are the next big wave of critical vulnerabilities because we moved trust from our data centers to cloud services \u2014 and good thing we did because they are better at security than most companies,&#8221; he says. &#8220;Now an issue that is in your cloud provider affects you and you may not even know it.&#8221;<\/p>\n<p>The most significant of the two vulnerabilities occurred in AWS Glue, a serverless integration service that allows AWS users to manage, clean, and transform data, and makes the datastore available to the user&#8217;s other services. Using this flaw, attackers could compromise the service and become an administrator \u2014 and because the Glue service is trusted, they could&nbsp;use their role to access other users&#8217; environments. <\/p>\n<p>The exploit allowed Orca&#8217;s researchers to &#8220;escalate privileges within the account to the point where we had unrestricted access to all resources for the service in the region, including full administrative privileges,&#8221; the company&nbsp;<a href=\"https:\/\/orca.security\/resources\/blog\/aws-glue-vulnerability\/\" target=\"_blank\" rel=\"noopener\">stated in its advisory<\/a>.<\/p>\n<p>Orca&#8217;s researchers could assume roles in other AWS customers&#8217; accounts that have a trusted relationship with the Glue service. Orca maintains that every account that uses the Glue service has at least one role that trusts the Glue service.<\/p>\n<p>A second vulnerability in the CloudFormation (CF) service, which allows users to provision resources and cloud assets, allowed the researchers to compromise a CF server and run as an AWS infrastructure service. The vulnerability, an XML External Entity (XXE) issue, could likely have allowed attacks to pierce through the protections isolating different AWS users, <a href=\"https:\/\/orca.security\/resources\/blog\/aws-cloudformation-vulnerability\/\" target=\"_blank\" rel=\"noopener\">Orca Security stated in a second advisory<\/a>.<\/p>\n<p>Cloud providers should work to improve the isolation of their services to prevent attackers from using vulnerabilities in a core service to compromise the security model of the overall cloud, Alon says. A similar issue affected Azure in August 2021, when researchers at cloud security firm Wiz.io found a flaw in the way Microsoft integrated Jupyter Notebooks, a data-science feature, and its Cosmo DB database-as-a-service. By using Jupyter Notebooks, <a href=\"https:\/\/www.darkreading.com\/cloud\/cloud-attack-analysis-unearths-lessons-for-security-pros\" target=\"_blank\" rel=\"noopener\">attackers could access the Cosmo DB instances of other users<\/a>. <\/p>\n<p>The AWS vulnerabilities underscore the benefits and drawbacks of the cloud model. Security issues affecting cloud providers often put every customer at risk, and there is little most customers can do to protect their data and environments. Compare that to widespread software issues, such as the Log4j vulnerability: Security and IT teams can patch the issue, keep watch for attacks, and put in workarounds. <\/p>\n<p>Still, eliminating the Log4j issue remains a problem because different companies patch the issue at different rates. Orca found that <a href=\"https:\/\/orca.security\/resources\/blog\/two-critical-cloud-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\">three-quarters of its customers<\/a> were still vulnerable to the Log4j vulnerabilities two weeks after the issue was disclosed. Amazon, on the other hand, patched the Glue flaw discovered by Orca within 48 hours and the CloudFormation problem within six days, according to the security firm.<\/p>\n<p>&#8220;Cloud providers do a tremendous job of security, but there are still issues,&#8221; says Alon. &#8220;If they compartmentalize better and create a better permission system in their service, it would prevent a lot of these issues. They also need to segment their networks better and have a better security model if there is a breach in their service.&#8221;<\/p>\n<p>Orca Security discovered the issues in September and October. They used a dummy account to test the vulnerabilities, preventing researchers from exposing the data of other AWS customers. The vulnerabilities were fixed by Amazon, and the patches were tested by Orca to verify the fixes.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Major cloud providers are vulnerable to exploitation because a single flaw can be turned into a global attack using trusted core services.Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-44793","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Vulnerabilities Highlight Risks of Trust in Public Cloud 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Vulnerabilities Highlight Risks of Trust in Public Cloud 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-13T18:30:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5ec1ae6fe5a690f1\/61e045df60444b75b6392322\/orca_security_aws_superglue_attack_flow.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"New Vulnerabilities Highlight Risks of Trust in Public Cloud\",\"datePublished\":\"2022-01-13T18:30:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\\\/\"},\"wordCount\":733,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt5ec1ae6fe5a690f1\\\/61e045df60444b75b6392322\\\/orca_security_aws_superglue_attack_flow.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\\\/\",\"name\":\"New Vulnerabilities Highlight Risks of Trust in Public Cloud 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt5ec1ae6fe5a690f1\\\/61e045df60444b75b6392322\\\/orca_security_aws_superglue_attack_flow.jpg\",\"datePublished\":\"2022-01-13T18:30:02+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt5ec1ae6fe5a690f1\\\/61e045df60444b75b6392322\\\/orca_security_aws_superglue_attack_flow.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt5ec1ae6fe5a690f1\\\/61e045df60444b75b6392322\\\/orca_security_aws_superglue_attack_flow.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Vulnerabilities Highlight Risks of Trust in Public Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Vulnerabilities Highlight Risks of Trust in Public Cloud 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/","og_locale":"en_US","og_type":"article","og_title":"New Vulnerabilities Highlight Risks of Trust in Public Cloud 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-01-13T18:30:02+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5ec1ae6fe5a690f1\/61e045df60444b75b6392322\/orca_security_aws_superglue_attack_flow.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"New Vulnerabilities Highlight Risks of Trust in Public Cloud","datePublished":"2022-01-13T18:30:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/"},"wordCount":733,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5ec1ae6fe5a690f1\/61e045df60444b75b6392322\/orca_security_aws_superglue_attack_flow.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/","url":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/","name":"New Vulnerabilities Highlight Risks of Trust in Public Cloud 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5ec1ae6fe5a690f1\/61e045df60444b75b6392322\/orca_security_aws_superglue_attack_flow.jpg","datePublished":"2022-01-13T18:30:02+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5ec1ae6fe5a690f1\/61e045df60444b75b6392322\/orca_security_aws_superglue_attack_flow.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5ec1ae6fe5a690f1\/61e045df60444b75b6392322\/orca_security_aws_superglue_attack_flow.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/new-vulnerabilities-highlight-risks-of-trust-in-public-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"New Vulnerabilities Highlight Risks of Trust in Public Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44793"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44793\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}