When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
The majority of the flaws revolve around weak permission controls, it was said.
Other notable mentions include poor user input validation processes, and flawed authentication processes.
The silver lining here is that there is no evidence of these flaws being exploited in the wild.
Vendors should also actively engage in pentesting, software audits, employee training, and more.
Multi-factor authentication (MFA) should be omnipresent in these platforms, he believes.
This series of disclosures is a wake-up call to all organizations that manage sensitive public data, Parker wrote.
ViaArs Technica