Okie_cheong
2021-12-13
Up n strong!!! 🚀🚀🚀
Tech Giants Microsoft, Amazon, and Others Warn of Widespread Software Flaw
免责声明:上述内容仅代表发帖人个人观点,不构成本平台的任何投资建议。
分享至
微信
复制链接
精彩评论
我们需要你的真知灼见来填补这片空白
打开APP,发表看法
APP内打开
发表看法
2
{"i18n":{"language":"zh_CN"},"detailType":1,"isChannel":false,"data":{"magic":2,"id":604112791,"tweetId":"604112791","gmtCreate":1639358885212,"gmtModify":1639358885450,"author":{"id":3586231647181730,"idStr":"3586231647181730","authorId":3586231647181730,"authorIdStr":"3586231647181730","name":"Okie_cheong","avatar":"https://static.tigerbbs.com/58d32683390fe18e22d3aed1e3b8b4bb","vip":1,"userType":1,"introduction":"","boolIsFan":false,"boolIsHead":false,"crmLevel":2,"crmLevelSwitch":0,"individualDisplayBadges":[],"fanSize":19,"starInvestorFlag":false},"themes":[],"images":[],"coverImages":[],"extraTitle":"","html":"<html><head></head><body><p>Up n strong!!! 🚀🚀🚀</p></body></html>","htmlText":"<html><head></head><body><p>Up n strong!!! 🚀🚀🚀</p></body></html>","text":"Up n strong!!! 🚀🚀🚀","highlighted":1,"essential":1,"paper":1,"likeSize":2,"commentSize":0,"repostSize":0,"favoriteSize":0,"link":"https://laohu8.com/post/604112791","repostId":1145558870,"repostType":4,"repost":{"id":"1145558870","kind":"news","pubTimestamp":1639354091,"share":"https://www.laohu8.com/m/news/1145558870?lang=&edition=full","pubTime":"2021-12-13 08:08","market":"us","language":"en","title":"Tech Giants Microsoft, Amazon, and Others Warn of Widespread Software Flaw","url":"https://stock-news.laohu8.com/highlight/detail?id=1145558870","media":"The Wall Street Journal","summary":"Cybersecurity researchers say they have seen thousands of attempts to exploit the bug\nThe flaw gives","content":"<p>Cybersecurity researchers say they have seen thousands of attempts to exploit the bug</p>\n<p class=\"t-img-caption\"><img src=\"https://static.tigerbbs.com/53c833789ad9a60f8319b1af6dcafe1b\" tg-width=\"1290\" tg-height=\"859\" width=\"100%\" height=\"auto\"><span>The flaw gives hackers a way of forcing downloads of unauthorized software.</span></p>\n<p>Companies and governments around the world rushed over the weekend to fend off cyberattacks looking to exploit a serious flaw in a widely used piece of Internet software that security experts warn could give hackers sweeping access to networks.</p>\n<p>Cybersecurity researchers said the bug, hidden in an obscure piece of server software called Log4j, represents one of the biggest risks seen in recent years because the code is so widely used on corporate networks.</p>\n<p>The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency issued an urgent alert about the vulnerability and urged companies to take action. CISA Director Jen Easterly said on Saturday, “To be clear, this vulnerability poses a severe risk. We will only minimize potential impacts through collaborative efforts between government and the private sector.” Germany’s cybersecurity organization over the weekend issued a “red alert” about the bug. Australia called the issue “critical.”</p>\n<p>Security experts warned that it could take weeks or more to assess the extent of the damage and that hackers exploiting the vulnerability could access sensitive data on networks and install back doors they could use to maintain access to servers even after the flawed software has been patched.</p>\n<p>“It is one of the most significant vulnerabilities that I’ve seen in a long time,” said Aaron Portnoy, principal scientist with the security firm Randori.</p>\n<p>Security experts noted that many companies have other processes in place that would prevent a malicious hacker from running software and breaking into these companies, potentially limiting the fallout from the bug.</p>\n<p>Microsoft Corp., in an alert to customers, said “attackers are probing all endpoints for vulnerability.”Amazon.com Inc.,Twitter Inc and Cisco Systems Inc. were among the companies that have said they were carrying out investigations into the depth of the problem. Amazon, the world’s biggest cloud computing company, said in a security alert, “We are actively monitoring this issue, and are working on addressing it.”</p>\n<p>The software flaw was reported late last month to the Log4j development team, a group of volunteer coders who distribute their software free-of-charge as part of the Apache Software Foundation, according to Ralph Goers, a volunteer with the project. The foundation, a nonprofit group that helps oversee the development of many open-source programs, alerted its user community about the vulnerability on Dec. 9.</p>\n<p>“It’s a very critical issue,” Mr. Goers said. “People need to upgrade to get the fix,” he said. Log4j is used on servers to keep records of users’ activities so they can be reviewed later on by security or software development teams.</p>\n<p>Because Log4j is distributed free, it is unclear how many servers are affected by the bug, but the logging software has been downloaded millions of times, Mr. Goers said.</p>\n<p>Software providers that include Log4j in their products, such asInternational Business Machines Corp.’s Red Hat,Oracle Corp. and VMwareInc.,have said they are deploying patches.</p>\n<p>It isn’t the first time that open-source software has sparked security concerns. In 2014, internet users world-wide were urged to reset their passwords after another issue, known as Heartbleed, was discovered in OpenSSL, an obscure yet similarly ubiquitous piece of internet software built by volunteers.</p>\n<p>Hackers started exploiting the flaw widely early Friday, including to gain access to servers running Microsoft’s Minecraft gaming software, researchers said. The researchers soon observed widespread scanning and attempts to trigger the Log4j bug across the Internet. In a note published Friday, Microsoft advised some Minecraft gamers that they should upgrade their software to patch the bug.</p>\n<p>During a roughly 24-hour period, the security firm Check Point Software Technologies Ltd. said it saw more than 100,000 attempts to exploit the bug, about half of which it estimated were from malicious cyberattackers. The rest were by legitimate researchers, either governments scanning national infrastructure or security researchers, Check Point said.</p>\n<p>A Dutch researcher, Cas van Cooten, said he discovered the bug on Apple Inc.’s servers, potentially giving him a way of running code within Apple’s network. Mr. van Cooten said he immediately reported the issue to Apple.</p>\n<p>“It would have been trivial for a malicious hacker to weaponize this,” he said. An Apple spokesman didn’t respond to messages seeking comment.</p>\n<p>Another researcher, Carson Owlett, said that consultants working with his security firm, Black Mirage LLC, were able to detect the bug on systems run by other companies, including Twitter and LinkedIn, also owned by Microsoft.</p>\n<p>“Our teams are looking into it, but we have no details to share at this time,” a Twitter spokeswoman said via email Friday. A LinkedIn spokeswoman said via text message that “while we’re responding to this, just as security teams at many companies are, we’re not experiencing any active issue.”</p>\n<p>Because all sorts of data are logged by servers, everything from email addresses to web navigation requests, these attempts could give attackers a foothold on a vulnerable server deep in corporate networks, said Ryan McGeehan, an independent security consultant who was formerly a director of security at Facebook. “A successful attack is like creating a wormhole,” he said. “The attacker can’t be sure where they’ll end up.”</p>\n<p>Cisco is investigating more than 150 of its products to look for the Log4j bug. So far, it has found three vulnerable products and determined that 23 aren’t vulnerable, a company spokesman said Saturday.</p>","collect":0,"html":"<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=utf-8\" />\n<meta name=\"viewport\" content=\"width=device-width,initial-scale=1.0,minimum-scale=1.0,maximum-scale=1.0,user-scalable=no\"/>\n<meta name=\"format-detection\" content=\"telephone=no,email=no,address=no\" />\n<title>Tech Giants Microsoft, Amazon, and Others Warn of Widespread Software Flaw</title>\n<style type=\"text/css\">\na,abbr,acronym,address,applet,article,aside,audio,b,big,blockquote,body,canvas,caption,center,cite,code,dd,del,details,dfn,div,dl,dt,\nem,embed,fieldset,figcaption,figure,footer,form,h1,h2,h3,h4,h5,h6,header,hgroup,html,i,iframe,img,ins,kbd,label,legend,li,mark,menu,nav,\nobject,ol,output,p,pre,q,ruby,s,samp,section,small,span,strike,strong,sub,summary,sup,table,tbody,td,tfoot,th,thead,time,tr,tt,u,ul,var,video{ font:inherit;margin:0;padding:0;vertical-align:baseline;border:0 }\nbody{ font-size:16px; line-height:1.5; color:#999; background:transparent; }\n.wrapper{ overflow:hidden;word-break:break-all;padding:10px; }\nh1,h2{ font-weight:normal; line-height:1.35; margin-bottom:.6em; }\nh3,h4,h5,h6{ line-height:1.35; margin-bottom:1em; }\nh1{ font-size:24px; }\nh2{ font-size:20px; }\nh3{ font-size:18px; }\nh4{ font-size:16px; }\nh5{ font-size:14px; }\nh6{ font-size:12px; }\np,ul,ol,blockquote,dl,table{ margin:1.2em 0; }\nul,ol{ margin-left:2em; }\nul{ list-style:disc; }\nol{ list-style:decimal; }\nli,li p{ margin:10px 0;}\nimg{ max-width:100%;display:block;margin:0 auto 1em; }\nblockquote{ color:#B5B2B1; border-left:3px solid #aaa; padding:1em; }\nstrong,b{font-weight:bold;}\nem,i{font-style:italic;}\ntable{ width:100%;border-collapse:collapse;border-spacing:1px;margin:1em 0;font-size:.9em; }\nth,td{ padding:5px;text-align:left;border:1px solid #aaa; }\nth{ font-weight:bold;background:#5d5d5d; }\n.symbol-link{font-weight:bold;}\n/* header{ border-bottom:1px solid #494756; } */\n.title{ margin:0 0 8px;line-height:1.3;color:#ddd; }\n.meta {color:#5e5c6d;font-size:13px;margin:0 0 .5em; }\na{text-decoration:none; color:#2a4b87;}\n.meta .head { display: inline-block; overflow: hidden}\n.head .h-thumb { width: 30px; height: 30px; margin: 0; padding: 0; border-radius: 50%; float: left;}\n.head .h-content { margin: 0; padding: 0 0 0 9px; float: left;}\n.head .h-name {font-size: 13px; color: #eee; margin: 0;}\n.head .h-time {font-size: 11px; color: #7E829C; margin: 0;line-height: 11px;}\n.small {font-size: 12.5px; display: inline-block; transform: scale(0.9); -webkit-transform: scale(0.9); transform-origin: left; -webkit-transform-origin: left;}\n.smaller {font-size: 12.5px; display: inline-block; transform: scale(0.8); -webkit-transform: scale(0.8); transform-origin: left; -webkit-transform-origin: left;}\n.bt-text {font-size: 12px;margin: 1.5em 0 0 0}\n.bt-text p {margin: 0}\n</style>\n</head>\n<body>\n<div class=\"wrapper\">\n<header>\n<h2 class=\"title\">\nTech Giants Microsoft, Amazon, and Others Warn of Widespread Software Flaw\n</h2>\n\n<h4 class=\"meta\">\n\n\n2021-12-13 08:08 GMT+8 <a href=https://www.barrons.com/articles/tech-giants-microsoft-amazon-and-others-warn-of-widespread-software-flaw-51639327724?mod=hp_LATEST><strong>The Wall Street Journal</strong></a>\n\n\n</h4>\n\n</header>\n<article>\n<div>\n<p>Cybersecurity researchers say they have seen thousands of attempts to exploit the bug\nThe flaw gives hackers a way of forcing downloads of unauthorized software.\nCompanies and governments around the ...</p>\n\n<a href=\"https://www.barrons.com/articles/tech-giants-microsoft-amazon-and-others-warn-of-widespread-software-flaw-51639327724?mod=hp_LATEST\">Web Link</a>\n\n</div>\n\n\n</article>\n</div>\n</body>\n</html>\n","type":0,"thumbnail":"","relate_stocks":{"MSFT":"微软","TWTR":"Twitter","AMZN":"亚马逊","ORCL":"甲骨文","VMW":"威睿","CSCO":"思科","IBM":"IBM"},"source_url":"https://www.barrons.com/articles/tech-giants-microsoft-amazon-and-others-warn-of-widespread-software-flaw-51639327724?mod=hp_LATEST","is_english":true,"share_image_url":"https://static.laohu8.com/e9f99090a1c2ed51c021029395664489","article_id":"1145558870","content_text":"Cybersecurity researchers say they have seen thousands of attempts to exploit the bug\nThe flaw gives hackers a way of forcing downloads of unauthorized software.\nCompanies and governments around the world rushed over the weekend to fend off cyberattacks looking to exploit a serious flaw in a widely used piece of Internet software that security experts warn could give hackers sweeping access to networks.\nCybersecurity researchers said the bug, hidden in an obscure piece of server software called Log4j, represents one of the biggest risks seen in recent years because the code is so widely used on corporate networks.\nThe Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency issued an urgent alert about the vulnerability and urged companies to take action. CISA Director Jen Easterly said on Saturday, “To be clear, this vulnerability poses a severe risk. We will only minimize potential impacts through collaborative efforts between government and the private sector.” Germany’s cybersecurity organization over the weekend issued a “red alert” about the bug. Australia called the issue “critical.”\nSecurity experts warned that it could take weeks or more to assess the extent of the damage and that hackers exploiting the vulnerability could access sensitive data on networks and install back doors they could use to maintain access to servers even after the flawed software has been patched.\n“It is one of the most significant vulnerabilities that I’ve seen in a long time,” said Aaron Portnoy, principal scientist with the security firm Randori.\nSecurity experts noted that many companies have other processes in place that would prevent a malicious hacker from running software and breaking into these companies, potentially limiting the fallout from the bug.\nMicrosoft Corp., in an alert to customers, said “attackers are probing all endpoints for vulnerability.”Amazon.com Inc.,Twitter Inc and Cisco Systems Inc. were among the companies that have said they were carrying out investigations into the depth of the problem. Amazon, the world’s biggest cloud computing company, said in a security alert, “We are actively monitoring this issue, and are working on addressing it.”\nThe software flaw was reported late last month to the Log4j development team, a group of volunteer coders who distribute their software free-of-charge as part of the Apache Software Foundation, according to Ralph Goers, a volunteer with the project. The foundation, a nonprofit group that helps oversee the development of many open-source programs, alerted its user community about the vulnerability on Dec. 9.\n“It’s a very critical issue,” Mr. Goers said. “People need to upgrade to get the fix,” he said. Log4j is used on servers to keep records of users’ activities so they can be reviewed later on by security or software development teams.\nBecause Log4j is distributed free, it is unclear how many servers are affected by the bug, but the logging software has been downloaded millions of times, Mr. Goers said.\nSoftware providers that include Log4j in their products, such asInternational Business Machines Corp.’s Red Hat,Oracle Corp. and VMwareInc.,have said they are deploying patches.\nIt isn’t the first time that open-source software has sparked security concerns. In 2014, internet users world-wide were urged to reset their passwords after another issue, known as Heartbleed, was discovered in OpenSSL, an obscure yet similarly ubiquitous piece of internet software built by volunteers.\nHackers started exploiting the flaw widely early Friday, including to gain access to servers running Microsoft’s Minecraft gaming software, researchers said. The researchers soon observed widespread scanning and attempts to trigger the Log4j bug across the Internet. In a note published Friday, Microsoft advised some Minecraft gamers that they should upgrade their software to patch the bug.\nDuring a roughly 24-hour period, the security firm Check Point Software Technologies Ltd. said it saw more than 100,000 attempts to exploit the bug, about half of which it estimated were from malicious cyberattackers. The rest were by legitimate researchers, either governments scanning national infrastructure or security researchers, Check Point said.\nA Dutch researcher, Cas van Cooten, said he discovered the bug on Apple Inc.’s servers, potentially giving him a way of running code within Apple’s network. Mr. van Cooten said he immediately reported the issue to Apple.\n“It would have been trivial for a malicious hacker to weaponize this,” he said. An Apple spokesman didn’t respond to messages seeking comment.\nAnother researcher, Carson Owlett, said that consultants working with his security firm, Black Mirage LLC, were able to detect the bug on systems run by other companies, including Twitter and LinkedIn, also owned by Microsoft.\n“Our teams are looking into it, but we have no details to share at this time,” a Twitter spokeswoman said via email Friday. A LinkedIn spokeswoman said via text message that “while we’re responding to this, just as security teams at many companies are, we’re not experiencing any active issue.”\nBecause all sorts of data are logged by servers, everything from email addresses to web navigation requests, these attempts could give attackers a foothold on a vulnerable server deep in corporate networks, said Ryan McGeehan, an independent security consultant who was formerly a director of security at Facebook. “A successful attack is like creating a wormhole,” he said. “The attacker can’t be sure where they’ll end up.”\nCisco is investigating more than 150 of its products to look for the Log4j bug. So far, it has found three vulnerable products and determined that 23 aren’t vulnerable, a company spokesman said Saturday.","news_type":1},"isVote":1,"tweetType":1,"viewCount":965,"commentLimit":10,"likeStatus":false,"favoriteStatus":false,"reportStatus":false,"symbols":[],"verified":2,"subType":0,"readableState":1,"langContent":"CN","currentLanguage":"CN","warmUpFlag":false,"orderFlag":false,"shareable":true,"causeOfNotShareable":"","featuresForAnalytics":[],"commentAndTweetFlag":false,"andRepostAutoSelectedFlag":false,"upFlag":false,"length":18,"xxTargetLangEnum":"ZH_CN"},"commentList":[],"isCommentEnd":true,"isTiger":false,"isWeiXinMini":false,"url":"/m/post/604112791"}
精彩评论