Menu
Washingtoner
  • Home
  • Financial
  • Home
  • Business
  • Construction
  • Education
  • Technology
  • Marketing
  • Non-profit
Washingtoner

Cyberpion Reveals A Quarter of Fortune 500 Companies Have Exploitable Vulnerabilities in their External IT Network
Washingtoner/10132666

Trending...
  • Tacoma: Community Event Funding Announced for 2026
  • Boston Corporate Coach™ Sets Global Standard for Executive Chauffeur Services Across 680 Cities
  • Tacoma Police Arrest Suspect in Series of Robberies Targeting Elderly Women
KIRKLAND, Wash. and TEL AVIV, Israel, Sept. 14, 2021 /PRNewswire/ -- Cyberpion, a cybersecurity pioneer in external attack surface management (EASM), today presented research showing that nearly three quarters of Fortune 500 companies' IT infrastructure exists outside their organization, a quarter of which was found to have a known vulnerability that threat actors could infiltrate to access sensitive employee or customer data.

Key research findings:
  • 73% of Fortune 500 companies' total IT infrastructure is external to the organization, of which 24% is considered at risk or has a known vulnerability
    • The total IT infrastructure includes the IT assets that are owned and operated by vendors the Fortune 500 enterprises incorporated into their online footprint
    • These IT assets include servers, cloud storage, CDNs, DNS (Domain Name Servers), email servers and other online elements
  • 71% of total cloud-based IT assets are external to the organization, of which 25% failed at least one security test
    • An example of cloud vulnerability includes cloud storage configured to allow anyone to read or write its contents
  • On average, a Fortune 500 company's infrastructure contains 126 different login pages for either customer or employee portals or services - the highest number was over 3,000
    • Nearly 10% of these login pages are considered insecure due to the transmission of unencrypted login data, or issues with SSL certificates, which helps ensure that the submission is being sent to the authorized destination
    • 30% allow transmission over HTTP
    • 12% have invalid certificates/encryption
    • Hackers exploiting these logins could access a wealth of sensitive employee or customer data
  • Fortune 500 organizations connect to an average of 951 cloud assets, of which nearly 5% are vulnerable to severe abuse
    • For example, a misconfigured AWS bucket could allow hackers to read or overwrite the data which could be customer PII or application code
    • The largest exposure was well over 30K cloud assets

Cyberpion collected these results by performing a cursory single-pass scan of the public and internet-facing assets of every Fortune 500 company in the first half of 2021.

More on Washingtoner
  • Slick Cash Loan shares credit score tips for borrowers using bad credit loans
  • Crossroads4Hope Welcomes New Trustees to Board of Directors as Organization Enters 25th Year of Caring
  • PromptBuilder.cc Launches AI Prompt Generator Optimized For ChatGPT, Gemini, Grok & Claude
  • Spokane: Council to Hold Press Conference to Discuss Further Information on Department of Justice Grant
  • UK Financial Ltd Advances Compliance Strategy With January 30th CATEX Exchange Listing Of Maya Preferred PRA Preferred Class Regulated Security Token

According to Gartner1, "EASM is an emerging concept that is growing quickly in terms of awareness within the security vendor community but at a slower pace within end-user organizations...They help security professionals identify exposed vulnerabilities from known and unknown enterprise assets and prioritize the most critical issues to be tackled...EASM should be part of a broader vulnerability and threat management effort aimed at discovering and managing internal- and external-facing assets and their potential vulnerabilities."

Traditional third-party risk management solutions have focused exclusively on the vendors and the IT infrastructures that are directly connected to the enterprise. This approach ignores the true scale of the problem and represents only the tip of the iceberg. Third-party vendors have also adopted a distributed IT infrastructure, and have built their applications and services using their own vendors and third-parties. Those in turn build their solutions upon even more partners. This extensive ecosystem creates an external attack surface that is uniquely appealing to hackers to attack, and extremely complicated for enterprises to manage securely.

Hackers are finding it easier to takeover or exploit the vulnerabilities in the third-party assets within the enterprise's ecosystem in order to carry out attacks such as: malicious code injection (Magecart-style attacks), DNS hijacks, or abusing the branded assets of an enterprise. These breaches ultimately lead to data loss, brand reputation damage, and stolen customer data for the enterprise.

"Security teams often can't effectively defend against attacks stemming from third-parties because they lack visibility into the total inventory and volume of assets they are connected to," said Cyberpion CEO Nethanel Gelertner. "They are unaware of the exposure to these external vulnerabilities, and can't identify and mitigate against these risks. In addition, the growth of these interconnected assets continues to explode due to trends in cloud-first architectures and digital transformation initiatives, meaning that assessing and protecting the attack surface has become even more challenging over time."

More on Washingtoner
  • Tacoma: OMWBE Certification 201 Workshop on February 12
  • TBM Council Appoints U.S. Department of Transportation CDIO Pavan Pidugu to Board of Directors
  • NOW OPEN - New Single Family Home Community in Manalapan
  • Kintetsu And Oversee Announce New Partnership
  • Save 10 Percent Off KeysCaribbean's Newly Added Luxury Vacation Home in Marathon

About Cyberpion

Cyberpion solves the rising cybersecurity challenge of understanding the risks and vulnerabilities of your connected online assets that form an external attack surface. Knowing how your organization is vulnerable, where those threats come from, and what infrastructures are at risk, is critical to preventing an attack before it happens. Cyberpion helps organizations mitigate these advanced threats by continuously monitoring, discovering, and assessing the threat vectors present throughout online ecosystems that exist outside the traditional security perimeter. With an R&D team based in Israel, the company is funded by leading cybersecurity venture capitalists. To learn more, visit cyberpion.com.

For more information, please contact:
Josh Turner
Si14 Global Communications
josh.[email protected]

1 Gartner, "Emerging Technologies: Critical Insights for External Attack Surface Management" by Ruggero Contu, Elizabeth Kim and Mark Wah, March 19, 2021

SOURCE Cyberpion
Show All News | Report Violation

0 Comments
1000 characters max.

Latest on Washingtoner
  • Junetini Unveils Grown & Sexy 80 Proof Blanco Tequila
  • Tacoma Police Arrest Suspect in Series of Robberies Targeting Elderly Women
  • CPPS Announces Team Growth and Leadership Updates
  • FeedSocially - Post Once, Publish Everywhere
  • James D. Harding Promoted to Century Fasteners Corp. – Managing Director
  • Finland's New Gambling Watchdog Handed Sweeping Powers to Revoke Licenses and Block Illegal Casino Sites
  • Powering the AI, Defense and Aerospace Future with Energy Infrastructure and Digital Asset Strength: KULR Technology Group, Inc. $KULR
  • $10 Price Target in Think Equity Report Supported by Inventory Financing Floorplan Boot to $60 Million for 2026 Sales Growth in Pre-Owned Boats: $OTH
  • Poolvillas Expands Local Presence on the Costa Blanca with New Offices in Moraira and Denia – Over 30 Years of Expertise Now Even Closer to Guests
  • Radarsign Redefines Crosswalk Safety with Launch of CrossCommand™ RRFB Crosswalk
  • OpenSSL Corporation Opens 2026 Advisory Committees' Elections: Shape the Future!
  • Steve Everett Jr. Named President of L.T. Hampel Corporation
  • Acuvance Acquires ROI Healthcare Solutions, Building a Dedicated Healthcare ERP Practice
  • Max Tucci Award-Winning Media Powerhouse Launches New Podcast —Executive Produced by Emmy-Winning Daytime Icons Suzanne Bass & Fran Brescia Coniglio
  • MILBERT.ai Brings Real Time Session Defense to Google Workspace and Google Cloud
  • Appliance Outlet Caps Off a Record-Setting 2025 Nationwide, Gears Up for Even Greater Growth in 2026
  • Home Prices Just Hit 5X Median Income — So Americans Are Buying Businesses Instead of Houses
  • New USCIS Interpreter Requirements Create Demand for Qualified Immigration Interpreters — Local Expert Explains What Applicants Need to Know
  • CCHR White Paper Urges Government Crackdown on Troubled Teen and For-Profit Psychiatric Facilities
  • Still Searching for the Perfect Valentine's Gift? Lick Personal Oils Offers Romantic, Experience-Driven Alternatives to Traditional Presents
_catLbl0 _catLbl1

Popular on Washingtoner

  • City of Tacoma Secures Over $4 Million in Transportation Improvement Board Grants - 111
  • TBM Council Appoints Four Distinguished Leaders to Board of Directors - 105
  • Tacoma: Homicide Investigation – 3500 block of E Grandview Ave
  • Spokane: Council Members Official Swearing In Ceremony
  • Golden Paper Launches a New Chapter in Its Americas Strategy- EXPOPRINT Latin America 2026 in Brazil
  • TheOneLofi2: New Home for Chill Lo-Fi Hip Hop Beats Launches on YouTube
  • Appliance EMT Expands Professional Appliance Repair Services to Hartford, Connecticut
  • AI-Driven Drug Development with Publication of New Bioinformatics Whitepaper for BullFrog AI: $BFRG Strengthens Its Position in AI Drug Development
  • Donna Cardellino Manager/Facilitator Signs Justin Jeansonne Country Singer-Songwriter To Exclusive Management Deal For Global Music Expansion
  • Tacoma: Community Events on January 12 and January 15 Offer Opportunities to Meet Interim Police Chief Patti Jackson

Similar on Washingtoner

  • New Medium Article Explores Why Emotional Conversations Fail and What Most People Don't Understand About Connection
  • $80 Million Revenue Backlog for AI Cybersecurity Company Building the Future of Integrated Cybersecurity and Public Safety: $CYCU
  • Slick Cash Loan shares credit score tips for borrowers using bad credit loans
  • Crossroads4Hope Welcomes New Trustees to Board of Directors as Organization Enters 25th Year of Caring
  • UK Financial Ltd Advances Compliance Strategy With January 30th CATEX Exchange Listing Of Maya Preferred PRA Preferred Class Regulated Security Token
  • NOW OPEN - New Single Family Home Community in Manalapan
  • Why 'Instant-Liquidity' Gaming is Dominating the Nordic Tech Demographic
  • Cyntexa Outlines a Principles-first Approach to Modern Enterprise Transformation
  • Top 66 People-Centric Leaders of 2025 Prove Taking Care of People Is Taking Care of Business
  • Impact Futures Group expands through acquisition of specialist healthcare sector training provider Caring for Care
Copyright © 2026 washingtoner.com | Terms of Service | Privacy Policy | Contact Us | Contribute