Microsoft comes under blistering criticism for “grossly irresponsible” security::Azure looks like a house of cards collapsing under the weight of exploits and vulnerabilities.

  • HiddenLayer5@lemmy.ml
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    1 year ago

    Microsoft is in the business of making their users (of paid software) their beta testers so they don’t have to pay for actual beta testers. This was made obvious from their track record in recent years of bad Windows updates (that you’re not allowed to refuse) which resulted in bricked computers and/or data loss. Numerous incidents of this within the last 5 years alone. They also have more telemetry in their production software than a lot of companies have in their beta software, but that’s more because they can directly make money off that data.

    So remember: when you buy a Microsoft product, you’re paying for the privilege of testing their code in your own live production environment.

  • Viper_NZ@lemmy.nz
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    Good thing no one is putting anything important in azure, like core banking services…

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    10
    ·
    1 year ago

    This is the best summary I could come up with:


    We follow an extensive process involving a thorough investigation, update development for all versions of affected products, and compatibility testing among other operating systems and applications.

    Tenable is discussing the issue in only general terms to prevent malicious hackers from learning how to actively exploit it in the wild.

    It is for this reason that we are withholding all technical details.” While Yoran’s post and Tenable’s disclosure avoid the word vulnerability, the email said the term is accurate.

    The post came on the same day that security firm Sygnia disclosed a set of what it called “vectors” that could be leveraged following a successful breach of an Azure AD Connect account.

    “The default configuration exposes clients to the described vectors only if privileged access was gained to the AD Connect server,” Ilia Rabinovich, director of adversarial tactics at Sygnia, wrote in an email.

    Both Tenable and Sygnia said that the security vulnerabilities or vectors they disclosed weren’t related to the recent attack on Microsoft cloud customers.


    I’m a bot and I’m open source!

    • Quokka@quokk.au
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      1
      ·
      1 year ago

      Wow it’s like you chose every part of that article that didn’t help explain the story. Impressive how useless a bot you are.