Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Microsoft Azure Flaws Could Have Let Hackers Take Over Cloud Servers
- This topic has 0 replies, 1 voice, and was last updated 1 year, 2 months ago by .
Some cybersecurity researchers have announced that they have just patched two serious vulnerabilities in Microsoft Azure which would have allowed attackers “unauthorizedly access screenshots and sensitive information of any virtual machine running on Azure infrastructure—it doesn’t matter if they’re running on a shared, dedicated or isolated virtual machines.” One of the vulnerabilities lay in a request spoofing issue which affected the cloud computing service, and the other was a remote execution flaw which would have enabled a threat actor to take full control of business’s code. Luckily these security holes were brought up and patched before they could be taken advantage of.
You must be logged in to reply to this topic.