Check Point Research (CPR) recently discovered that in the last few months, many application developers put their data and users’ data at risk. In some cases, this type of misuse only affects the users, however, the developers were also left vulnerable. The misconfiguration of real-time databases is not new, but to our surprise, the scope of the issue is still far too broad and affects millions of users. All our researchers had to do was attempt to access the data, there was nothing in place to stop the unauthorized access from being processed.
Check Point Software
Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.