Essential cloud security

Cloud Scanning

The essential guide to start your cloud security journey.

Getting started with cloud security

6 min read

What Is Cloud Scanning, and Why Does it Matter?

Cloud scanning emerges as the critical solution to secure the ephemeral world of cloud computing, empowering security teams to navigate...

Shrikant Dhanawade
Feb 11, 2025
7 min read

Securing Dynamic Cloud Environments: Best Practices for Comprehensive Scanning

Traditional approaches to vulnerability scanning are no longer sufficient to secure the increasing complexity of dynamic cloud environments. While vulnerability...

Shrikant Dhanawade
Feb 18, 2025
9 min read

The State of Cloud and SaaS Security Report

The rapid adoption of cloud services and containerized applications has progressed unabated. See what more than 100 security and IT...

Dark Reading Research
Jan 28, 2025

Here are the most common cloud security issues. How many do you have?

45%

Misconfigured AWS Resources (Primarily RDS, Amazon Aurora, API Gateway)

70%

Misconfigured Azure Resources (Primarily Storage Account, Disks, WebApps)

63%

Misconfigured GCP Resources (Primarily Kubernetes Cluster, PostgreSQL, Storage, MySQL)

360K+

Public virtual machines (VMs) with no encryption on attached EBS volumes

50K+

Public VMs with destructive data permissions

15M

VMs with high and critical vulnerabilities

1M+

VMs led to privilege escalation

99%

VMs non-compliant with control for MFA delete on critical S3 buckets

3.9M+

VMs led to potential lateral movement

3M

VMs with at least one public exploit

14.7%

Vulnerabilities have public exploit with remote code execution (RCE)

98%

VMs non-compliant with control requiring monitoring of AWS organization changes

Source: Anonymized data from 44 million cloud VMs assessed by the Qualys Threat Research Unit in 2024.

Dive in with more cloud scanning articles

Blog
The Rising Threat of SSE-C Ransomware Attacks on AWS S3 Buckets

A new attack vector is targeting AWS S3 storage, exploiting the SSE-C feature for ransomware. Learn details about these...

Atul Parmar
Added,May 15, 2025
Blog
OWASP Kubernetes Top Ten

As Kubernetes becomes foundational to modern cloud-native applications, securing it requires more than ad-hoc checks — it demands a...

OWASP
Added,May 2, 2025
Video
Cloud Security 101

Looking to understand how to harness the power of cloud security? This webinar will provide a deep dive into...

Rob Smith
Added,Apr 18, 2025
Video
New to Containers? Learn How to Secure Them

As organizations adopt containers, understanding the risks that come with this modern architecture is critical. This short video from...

IBM
Added,Apr 11, 2025
Blog
Ingress vuln

Ingress-NGINX is one of the most widely used ingress controllers in Kubernetes environments. Recent vulnerabilities discovered in its annotations...

Diksha Ojha
Added,Apr 7, 2025
Blog
How Exposed Docker Daemon Ports Open the Door to Malware — and What You Can Do to Stop It

Unsecured Docker ports can expose systems to crypto - mining malware. Learn how attackers exploit them and how to...

Amit Gadhave
Added,Mar 29, 2025

A Custom Report For Your Domains—Completely Free?

REPORT

See all your cloud vulnerabilities for free today.

Get a Report

Test Drive QScanner

100% FREE TEST

Scan container images locally for vulnerabilities, misconfigs, and malware — right from your terminal or CI/CD pipeline.