June 8, 2017 By Shane Schick 2 min read

Vulnerabilities in mobile backends, web interfaces to the Internet of Things (IoT) and negligent DevOps practitioners are among the fastest growing application security threats, according to a report released at the InfoSecurity Europe conference in London this week.

What’s the Problem?

Research from High-Tech Bridge, a Swiss company that also operates in the U.S., said 83 percent of web service and application programming interfaces (APIs) used in apps for retail, banking and other markets could fall prey to XML or SQL injections.

The report, which is based on data from publicly available sources and the application security testing platform ImmuniWeb, cited problems such as poor encryption and admin credentials that can’t be modified in 98 percent of IoT devices. Additionally, while DevOps is a popular way to create applications quickly, the report said two-thirds of companies using this methodology had at least one high-risk vulnerability affecting an external application.

Addressing Application Security Threats

Many companies have tried to mitigate these kinds of application security risks by offering cash rewards to white-hat hackers who try to discover potential bugs or vulnerabilities. However, Help Net Security noted that the High-Tech Bridge report showed these bug bounty programs aren’t proving very effective: At least two major vulnerability were undiscovered by these individuals in 9 out of 10 bug bounty programs that had been running for a year or longer.

There’s no question enterprises need more than bug bounties to keep up with application security problems. For example, attacks based on cross-site scripting (XSS) were also called out as one of the most common vulnerabilities in the report, and they are among the most difficult to catch. Just a few weeks ago, for instance, Threatpost explained how Verizon had to patch an XXS vulnerability discovered in its messaging client.

Not everything in the application security report was negative. Tech Republic highlighted one finding from High-Tech Bridge, which explained that vast majority of mobile app code — as much as 95 percent — is not at risk of major breaches from cyberattackers. Despite this, the report also said companies should be working harder to protect web servers, improve web application firewalls and harden HTTPS encryption.

To learn more about this topic, download our complimentary Ponemon Institute “State of Mobile and IoT Security” study.

More from

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Quishing: A growing threat hiding in plain sight

4 min read - Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quick-response (QR) codes are a good example of this in action and help mobile devices quickly navigate to web pages or install new software by simply scanning an image.However, legitimate organizations aren’t the only ones…

Cybersecurity Awareness Month: 5 new AI skills cyber pros need

4 min read - The rapid integration of artificial intelligence (AI) across industries, including cybersecurity, has sparked a sense of urgency among professionals. As organizations increasingly adopt AI tools to bolster security defenses, cyber professionals now face a pivotal question: What new skills do I need to stay relevant?October is Cybersecurity Awareness Month, which makes it the perfect time to address this pressing issue. With AI transforming threat detection, prevention and response, what better moment to explore the essential skills professionals might require?Whether you're…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today