{"id":14291,"date":"2022-09-01T17:33:08","date_gmt":"2022-09-01T15:33:08","guid":{"rendered":"https:\/\/www.show.it\/hardcoded-aws-credentials-in-1800-mobile-apps-highlight-supply-chain-issues\/"},"modified":"2022-09-01T17:33:08","modified_gmt":"2022-09-01T15:33:08","slug":"hardcoded-aws-credentials-in-1800-mobile-apps-highlight-supply-chain-issues","status":"publish","type":"post","link":"https:\/\/www.show.it\/en\/hardcoded-aws-credentials-in-1800-mobile-apps-highlight-supply-chain-issues\/","title":{"rendered":"Hardcoded AWS Credentials in 1,800 Mobile Apps Highlight Supply Chain Issues"},"content":{"rendered":"<p><strong><span><span>Symantec has discovered hardcoded AWS credentials in more than 1,800 mobile applications and warned of the potential risks associated with poor security practices.<\/span><\/span><\/strong><\/p>\n<p><span><span>While Symantec\u2019s threat hunting team has looked at both Android and iOS apps, nearly all of the applications containing hardcoded credentials were developed for iOS.<\/span><\/span><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/hardcoded-aws-credentials-1800-mobile-apps-highlight-supply-chain-issues\" target=\"_blank\" rel=\"noopener\">read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Symantec has discovered hardcoded AWS credentials in more than 1,800 mobile applications and warned of the potential risks associated with poor security practices. While Symantec\u2019s threat hunting team has looked at both Android and iOS apps, nearly all of the applications containing hardcoded credentials were developed for iOS. read more<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[29,20,48,42,11,23],"tags":[],"class_list":["post-14291","post","type-post","status-publish","format-standard","hentry","category-application-security","category-cloud-security","category-mobile-wireless","category-mobile-security","category-news-industry","category-vulnerabilities"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/14291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/comments?post=14291"}],"version-history":[{"count":0,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/14291\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media?parent=14291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/categories?post=14291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/tags?post=14291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}