a link included in the files that contained backups of Microsoft employees' computers. Those backups contained passwords to Microsoft services, secret keys and over 30,000 internal Teams messages from hundreds of the tech giant's employees, Wiz says. Microsoft assures in itsof the incident, however, that"no customer data was exposed, and no other internal services were put at risk.
The link was deliberately included with the files so that interested researchers could download pretrained models — that part was no accident. Microsoft's researchers used anfeature called"SAS tokens," which allows users to create shareable links that give other people access to data in their Azure Storage account. Users can choose what information can be accessed through SAS links, whether it's a single file, a full container or their entire storage.
Wiz discovered and reported the security issue to Microsoft on June 22, and the company had revoked the SAS token by June 23. Microsoft also explained that it rescans all its public repositories, but its system had marked this particular link as a"false positive." The company has since fixed the issue, so that its system can detect SAS tokens that arepermissive than intended in the future.
مصر أحدث الأخبار, مصر عناوين
Similar News:يمكنك أيضًا قراءة قصص إخبارية مشابهة لهذه التي قمنا بجمعها من مصادر إخبارية أخرى.
مصدر: verge - 🏆 94. / 67 اقرأ أكثر »
مصدر: nbcchicago - 🏆 545. / 51 اقرأ أكثر »