Saturday, November 8, 2025
HomeTechnologyReport: Purposes and significant information susceptible to assault

Report: Purposes and significant information susceptible to assault

[ad_1]

Hear from CIOs, CTOs, and different C-level and senior execs on information and AI methods on the Way forward for Work Summit this January 12, 2022. Be taught extra


Based on a report by Synopsys, 97% of software program and techniques targets examined throughout 2020 had been discovered to comprise a vulnerability. Moreover, 30% of the targets had high-risk vulnerabilities, which risk actors might exploit to entry high-value assets, and 6% had critical-risk vulnerabilities, which might permit attackers to execute code and breach vital information on an online or cell utility or utility servers.

Insecure information storage and communication vulnerabilities plague cell purposes. Eighty % of the found vulnerabilities within the cell assessments had been associated to insecure information storage. These vulnerabilities might permit an attacker to achieve entry to a cell machine both bodily (i.e., accessing a stolen machine) or by means of malware. Fifty-three % of the cell assessments uncovered vulnerabilities related to insecure communications.

Furthermore, utility and server misconfigurations represented 21% of the general vulnerabilities, 19% of the vulnerabilities recognized had been associated to damaged entry management, and 28% of the entire take a look at targets had some publicity to cross-site scripting (XSS) assaults, which is among the most prevalent and harmful vulnerabilities impacting net purposes. As a result of many XSS vulnerabilities happen solely when the appliance is operating, the most effective method to safety testing is to leverage a broad spectrum of tooling options to make sure that an utility or system is safe.

Synopsys Application Security Testing Services 2020 by the Numbers. Number of test targets: 2,573. Number of tests: 3,937. Tests that uncovered vulnerabilities: 97%. Number of tests with high or critical severity vulnerabilities: 36%. Total number of vulnerabilities discovered: 28,501. Top vulnerability discovered: missing content-security-policy header at 52%. Top high-risk vulnerability discovered: stored cross-site scripting (XSS). Top critical vulnerability discovered: SQL injection at 3%. Types of tests include web app pen testing at 67%, web app dynamic analysis at 16%, mobile app analysis at 12%, source code analysis at 2%, and network security pen testing at 2%.

The industries represented within the assessments included software program and web, monetary providers, enterprise providers, manufacturing, media and leisure, and well being care. Of the examined targets, 83% had been net purposes and techniques, 12% had been cell apps, and the rest had been both supply code or community techniques or purposes. Contemplating that these industries are closely reliant on software program, it’s essential to forestall recognized software program vulnerabilities from severely impacting enterprise.

The info was compiled based mostly on 3,937 assessments carried out by Synopsys safety consultants throughout buyer engagements and embody penetration testing, dynamic utility safety testing, and cell utility safety analyses — all designed to confront operating purposes in the identical style as a real-world attacker.

Learn the full report by Synopsys.

VentureBeat

VentureBeat’s mission is to be a digital city sq. for technical decision-makers to achieve information about transformative know-how and transact.

Our web site delivers important info on information applied sciences and techniques to information you as you lead your organizations. We invite you to turn out to be a member of our group, to entry:

  • up-to-date info on the topics of curiosity to you
  • our newsletters
  • gated thought-leader content material and discounted entry to our prized occasions, resembling Rework 2021: Be taught Extra
  • networking options, and extra

Develop into a member

[ad_2]

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments