{"id":29800,"date":"2023-04-24T20:29:40","date_gmt":"2023-04-24T20:29:40","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=29800"},"modified":"2023-04-24T20:29:42","modified_gmt":"2023-04-24T20:29:42","slug":"misconfigured-registries","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/","title":{"rendered":"Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed"},"content":{"rendered":"\n<p>Aqua Security&#8217;s cloud security research team recently found thousands of registries and artifact repositories exposed online, revealing more than 250 million artifacts and over 65,000 container images.<\/p>\n\n\n\n<p>The registries and repositories belonged to a wide range of companies, including 10 members of the Fortune 500 and two leading cybersecurity providers.<\/p>\n\n\n\n<p>&#8220;In some of these cases, anonymous user access allowed a potential attacker to gain sensitive information, such as secrets, keys, and passwords, which could lead to a severe software supply chain attack and poisoning of the software development life cycle (SDLC),&#8221; the researchers noted in a <a href=\"https:\/\/blog.aquasec.com\/250m-artifacts-exposed-via-misconfigured-registries\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a>.<\/p>\n\n\n\n<p>&#8220;We believe that registries are a crucial part of the\u00a0software supply chain\u00a0in the cloud and that organizations don\u2019t pay enough attention to them,&#8221; they wrote. &#8220;If attackers gain access to registries, they can propagate and potentially exploit the entire SDLC.&#8221;<\/p>\n\n\n\n<p><strong>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-security-guidance-for-developers\/\">Software Supply Chain Security Guidance for Developers<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sensitive Information Exposed<\/h2>\n\n\n\n<p>While they expected to find some registries accessible online, the researchers wrote, they were surprised that &#8220;on 1,400 distinct hosts we found at least one sensitive key (such as keys, secrets, credentials, tokens, etc.) and on 156 hosts we found private sensitive addresses of end points (such as Redis, MongoDB, PostgreSQL, MySQL, etc.).&#8221;<\/p>\n\n\n\n<p>They also found 57 registries with critical vulnerabilities, such as default admin passwords, and more than 2,100 artifact registries with upload permissions, which could enable attackers to poison the registry with malicious code.<\/p>\n\n\n\n<p>Aqua Security staff software engineer Mor Weinberger told <em>eSecurity Planet<\/em> by email that containers and artifact registries play a crucial role in software development, but they have to be managed correctly. &#8220;Whether you&#8217;re a software provider or an open-source maintainer, the goal is to simplify the process of managing releases and making them easily accessible,&#8221; he said. &#8220;However, this should never come at the expense of security.&#8221;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;anonymous users should never be allowed to upload files to your releases&#8221;<\/p>\n<\/blockquote>\n\n\n\n<p>&#8220;Regardless of the situation, anonymous users should never be allowed to upload files to your releases (as we have seen in more than one instance),&#8221; Weinberger added. &#8220;Moreover, it&#8217;s essential to ensure that no sensitive information, such as secrets and PII, makes its way into your accessible artifacts. In general, once your artifacts are accessible to anyone, your software vulnerabilities within are also exposed.&#8221;<\/p>\n\n\n\n<p><em>See the <a href=\"https:\/\/www.esecurityplanet.com\/applications\/top-code-debugging-and-code-security-tools\/\">Top Code Debugging and Code Security Tools<\/a><\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Responding to Security Researchers<\/h2>\n\n\n\n<p>In one case detailed by the researchers, they found two exposed container image registries belonging to a Fortune 100 tech giant. &#8220;One of the container image manifests contained a command to download artifact from the artifact registry, which included an active API key to retrieve internal binaries as part of building an image,&#8221; they wrote. &#8220;We found that the artifact registry contained 2,600 repositories with over 240 million artifacts.&#8221;<\/p>\n\n\n\n<p>They reached out to the company, and its security team quickly responded. &#8220;We later learned that this was a case of shadow IT, where a developer with a side project opened an environment against policy and regulations without proper controls,&#8221; they wrote.<\/p>\n\n\n\n<p>Aqua Security lead threat intelligence and data analyst Assaf Morag told <em>eSecurity Planet<\/em> by email that it&#8217;s crucial for companies of all sizes to have a defined point of contact for security researchers and a known security disclosure playbook. &#8220;To do this, create a dedicated security email and assign someone to process the incoming emails,&#8221; he said.<\/p>\n\n\n\n<p>&#8220;If you have a severe misconfiguration or a vulnerability and someone is trying to reach out to you to let you know that, don&#8217;t make it harder on them, because they will eventually give up and stop,&#8221; Morag added. &#8220;There will then be a risk to your data, intellectual property, and customer information, as it might end up on the dark web. Someone could have stopped that, but there was no answer at the door when it mattered.&#8221;<\/p>\n\n\n\n<p><strong>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/container-and-kubernetes-security-vendors\/\">Top Container Security Solutions<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Steps to Take<\/h2>\n\n\n\n<p>The researchers suggest taking the following steps as soon as possible to mitigate these risks:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secure repositories with network controls such as a <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\">VPN<\/a> or <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">firewall<\/a><\/li>\n\n\n\n<li>Implement strong <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">authentication<\/a> and authorization measures<\/li>\n\n\n\n<li>Regularly rotate keys, credentials, and secrets<\/li>\n\n\n\n<li>Implementing <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">least privilege access controls<\/a> and scoping<\/li>\n\n\n\n<li>Regularly scan for sensitive data<\/li>\n<\/ul>\n\n\n\n<p>As more and more organizations move to the cloud, Morag said, we&#8217;re likely to continue to see an increase in misconfigurations. &#8220;These are most often caused by shadow IT, mistakes, a lack of knowledge or experience, and a lack of proper controls,&#8221; he said. &#8220;We really hope that this research and other similar security research will educate the community about the risks posed by this technology and the need to adopt security practices and tools to mitigate them.&#8221;<\/p>\n\n\n\n<p><strong>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-security-best-practices\/\">13 Cloud Security Best Practices<\/a><\/strong><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d3287db8a-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d3287db8a\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d3287db8a\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d3287db8a\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d3287db8a\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d3287db8a\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d3287db8a\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Development teams are exposing critical data and secrets online. Here&#8217;s what to do about it.<\/p>\n","protected":false},"author":166,"featured_media":29804,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2369,8610,3790,31987,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,225,31780],"class_list":["post-29800","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cloud-security","tag-container-security","tag-cybersecurity","tag-developer-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-cloud-security","b2b_product-patch-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed<\/title>\n<meta name=\"description\" content=\"Development teams are exposing critical data and secrets online. Here&#039;s what to do about it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed\" \/>\n<meta property=\"og:description\" content=\"Development teams are exposing critical data and secrets online. Here&#039;s what to do about it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-24T20:29:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-24T20:29:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/misconfigured-registries.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"764\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed\",\"datePublished\":\"2023-04-24T20:29:40+00:00\",\"dateModified\":\"2023-04-24T20:29:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/\"},\"wordCount\":788,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/misconfigured-registries.png\",\"keywords\":[\"cloud security\",\"container security\",\"cybersecurity\",\"developer security\",\"Web security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/\",\"name\":\"Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/misconfigured-registries.png\",\"datePublished\":\"2023-04-24T20:29:40+00:00\",\"dateModified\":\"2023-04-24T20:29:42+00:00\",\"description\":\"Development teams are exposing critical data and secrets online. Here's what to do about it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/misconfigured-registries.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/misconfigured-registries.png\",\"width\":1400,\"height\":764,\"caption\":\"Data security breach concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed","description":"Development teams are exposing critical data and secrets online. Here's what to do about it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/","og_locale":"en_US","og_type":"article","og_title":"Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed","og_description":"Development teams are exposing critical data and secrets online. Here's what to do about it.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/","og_site_name":"eSecurity Planet","article_published_time":"2023-04-24T20:29:40+00:00","article_modified_time":"2023-04-24T20:29:42+00:00","og_image":[{"width":1400,"height":764,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/misconfigured-registries.png","type":"image\/png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed","datePublished":"2023-04-24T20:29:40+00:00","dateModified":"2023-04-24T20:29:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/"},"wordCount":788,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/misconfigured-registries.png","keywords":["cloud security","container security","cybersecurity","developer security","Web security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/","url":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/","name":"Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/misconfigured-registries.png","datePublished":"2023-04-24T20:29:40+00:00","dateModified":"2023-04-24T20:29:42+00:00","description":"Development teams are exposing critical data and secrets online. Here's what to do about it.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/misconfigured-registries.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/misconfigured-registries.png","width":1400,"height":764,"caption":"Data security breach concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-registries\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/29800"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=29800"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/29800\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/29804"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=29800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=29800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=29800"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=29800"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=29800"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=29800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}