Remove cloud-security microsoft-azure-cloud-vulnerability-exposed-thousands-of-databases
article thumbnail

How we broke the cloud with two lines of code: the full story of ChaosDB

Security Affairs

Wiz Research Team disclosed technical details about the discovery of the ChaosDB vulnerability in Azure Cosmos DB database solution. This vulnerability was so severe that we didn’t want to share the full extent of it until enough time had passed to properly mitigate it. This, however, was not the full story of ChaosDB.

Cloud 123
article thumbnail

Sony sent data breach notifications to about 6,800 individuals

Security Affairs

Sony Interactive Entertainment (SIE) has notified current and former employees and their family members about a data breach that exposed their personal information. MOVEit Transfer is a managed file transfer that is used by enterprises to securely transfer files using SFTP, SCP, and HTTP-based uploads.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA urges enterprises to fix Microsoft Azure Cosmos DB flaw

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) issued an alert urging enterprises to address the recently disclosed vulnerability in Microsoft Azure Cosmos DB. reads the post published by the security firm, Azure Cosmos Darabase is Microsoft’s globally-distributed multi-model database service.

Cloud 108
article thumbnail

26k+ Kibana Instances exposed Elasticsearch databases online

Security Affairs

Security expert discovered thousands of unsafe Kibana instances that are exposed online, the news was first reported by colleagues at THN. A researcher that goes online with the Twitter handle @InfoSecIta has discovered over 26,000 Kibana installs exposed on the Internet, most of them in the US and China.

Cloud 90
article thumbnail

Guarding Against Solorigate TTPs

eSecurity Planet

Microsoft has dubbed the infamous supply chain compromise of SolarWinds as “Solorigate.” Since then, much has been learned about the tactics, techniques, and procedures (TTPs) deployed and what steps organizations are taking to harden their network and application security. Brief timeline of findings.

article thumbnail

Network Protection: How to Secure a Network

eSecurity Planet

Network security protects and monitors the links and the communications within the network using a combination of hardware, software, and enforced policies. Networks and network security comes in a wide range of complexity to fit the wide range of needs. For a more general overview consider reading: What is Network Security?

Security 109
article thumbnail

The Hacker Mind: Follow The Rabbit

ForAllSecure

Researchers Nir Ohfeld and Sagi Tzadik join The Hacker Mind to talk about their presentation at Black Hat Europe 2021 on the ChaosDB vulnerability. You might start out with an innocent question, like what if someone misconfigured their cloud configuration could it lead to holding the keys to Microsoft’s Azure Surface Fabric framework?