Yingyingloo
2021-09-09
ok
Microsoft warns Azure customers of flaw that could have permitted hackers access to data
免责声明:上述内容仅代表发帖人个人观点,不构成本平台的任何投资建议。
分享至
微信
复制链接
精彩评论
Yingyingloo
2021-09-09
Yingyingloo
👌🏻
什么也没有了~
APP内打开
发表看法
1
3
{"i18n":{"language":"zh_CN"},"detailType":1,"isChannel":false,"data":{"magic":2,"id":889652171,"tweetId":"889652171","gmtCreate":1631147208193,"gmtModify":1631889321556,"author":{"id":4090502512947490,"idStr":"4090502512947490","authorId":4090502512947490,"authorIdStr":"4090502512947490","name":"Yingyingloo","avatar":"https://static.tigerbbs.com/da58afbd656809ec183af4a539b38af6","vip":1,"userType":1,"introduction":"","boolIsFan":false,"boolIsHead":false,"crmLevel":2,"crmLevelSwitch":0,"individualDisplayBadges":[],"fanSize":14,"starInvestorFlag":false},"themes":[],"images":[],"coverImages":[],"extraTitle":"","html":"<html><head></head><body><p>ok</p></body></html>","htmlText":"<html><head></head><body><p>ok</p></body></html>","text":"ok","highlighted":1,"essential":1,"paper":1,"likeSize":3,"commentSize":1,"repostSize":0,"favoriteSize":0,"link":"https://laohu8.com/post/889652171","repostId":2166390651,"repostType":4,"repost":{"id":"2166390651","kind":"highlight","weMediaInfo":{"introduction":"Reuters.com brings you the latest news from around the world, covering breaking news in markets, business, politics, entertainment and technology","home_visible":1,"media_name":"Reuters","id":"1036604489","head_image":"https://static.tigerbbs.com/443ce19704621c837795676028cec868"},"pubTimestamp":1631146286,"share":"https://www.laohu8.com/m/news/2166390651?lang=&edition=full","pubTime":"2021-09-09 08:11","market":"us","language":"en","title":"Microsoft warns Azure customers of flaw that could have permitted hackers access to data","url":"https://stock-news.laohu8.com/highlight/detail?id=2166390651","media":"Reuters","summary":"SAN FRANCISCO, Sept 8 (Reuters) - Microsoft warned some of its Azure cloud computing customers that ","content":"<p>SAN FRANCISCO, Sept 8 (Reuters) - Microsoft warned some of its Azure cloud computing customers that a flaw discovered by security researchers could have allowed hackers access to their data.</p>\n<p>In a blog post from its security response team, Microsoft said it had fixed the flaw reported by Palo Alto Networks and it had no evidence malicious hackers had abused the technique.</p>\n<p>It said it had notified some customers they should change their login credentials as a precaution.</p>\n<p>The blog post followed questions from Reuters about the technique described by Palo Alto. Microsoft did not answer any of the questions, including whether it was confident no data had been accessed.</p>\n<p>In an earlier interview, Palo Alto researcher Ariel Zelivansky told Reuters his team had been able to break out of Azure's widely used system for so-called containers that store programs for users.</p>\n<p>The Azure containers used code that had not been updated to patch a known vulnerability, he said.</p>\n<p>As a result the Palo Alto team was able to eventually get full control of a cluster that included containers from other users.</p>\n<p>Palo Alto reported the issue to Microsoft in July. Zelivansky said the effort had taken his team several months and he agreed that malicious hackers probably had not used a similar method in real attacks.</p>\n<p>Still, the report is the second major flaw revealed in Microsoft's core Azure system in as many weeks. In late August, security experts at Wiz described a database flaw that also would have allowed one customer to alter another's data.</p>","collect":0,"html":"<!DOCTYPE html>\n<html>\n<head>\n<meta http-equiv=\"Content-Type\" content=\"text/html; charset=utf-8\" />\n<meta name=\"viewport\" content=\"width=device-width,initial-scale=1.0,minimum-scale=1.0,maximum-scale=1.0,user-scalable=no\"/>\n<meta name=\"format-detection\" content=\"telephone=no,email=no,address=no\" />\n<title>Microsoft warns Azure customers of flaw that could have permitted hackers access to data</title>\n<style type=\"text/css\">\na,abbr,acronym,address,applet,article,aside,audio,b,big,blockquote,body,canvas,caption,center,cite,code,dd,del,details,dfn,div,dl,dt,\nem,embed,fieldset,figcaption,figure,footer,form,h1,h2,h3,h4,h5,h6,header,hgroup,html,i,iframe,img,ins,kbd,label,legend,li,mark,menu,nav,\nobject,ol,output,p,pre,q,ruby,s,samp,section,small,span,strike,strong,sub,summary,sup,table,tbody,td,tfoot,th,thead,time,tr,tt,u,ul,var,video{ font:inherit;margin:0;padding:0;vertical-align:baseline;border:0 }\nbody{ font-size:16px; line-height:1.5; color:#999; background:transparent; }\n.wrapper{ overflow:hidden;word-break:break-all;padding:10px; }\nh1,h2{ font-weight:normal; line-height:1.35; margin-bottom:.6em; }\nh3,h4,h5,h6{ line-height:1.35; margin-bottom:1em; }\nh1{ font-size:24px; }\nh2{ font-size:20px; }\nh3{ font-size:18px; }\nh4{ font-size:16px; }\nh5{ font-size:14px; }\nh6{ font-size:12px; }\np,ul,ol,blockquote,dl,table{ margin:1.2em 0; }\nul,ol{ margin-left:2em; }\nul{ list-style:disc; }\nol{ list-style:decimal; }\nli,li p{ margin:10px 0;}\nimg{ max-width:100%;display:block;margin:0 auto 1em; }\nblockquote{ color:#B5B2B1; border-left:3px solid #aaa; padding:1em; }\nstrong,b{font-weight:bold;}\nem,i{font-style:italic;}\ntable{ width:100%;border-collapse:collapse;border-spacing:1px;margin:1em 0;font-size:.9em; }\nth,td{ padding:5px;text-align:left;border:1px solid #aaa; }\nth{ font-weight:bold;background:#5d5d5d; }\n.symbol-link{font-weight:bold;}\n/* header{ border-bottom:1px solid #494756; } */\n.title{ margin:0 0 8px;line-height:1.3;color:#ddd; }\n.meta {color:#5e5c6d;font-size:13px;margin:0 0 .5em; }\na{text-decoration:none; color:#2a4b87;}\n.meta .head { display: inline-block; overflow: hidden}\n.head .h-thumb { width: 30px; height: 30px; margin: 0; padding: 0; border-radius: 50%; float: left;}\n.head .h-content { margin: 0; padding: 0 0 0 9px; float: left;}\n.head .h-name {font-size: 13px; color: #eee; margin: 0;}\n.head .h-time {font-size: 11px; color: #7E829C; margin: 0;line-height: 11px;}\n.small {font-size: 12.5px; display: inline-block; transform: scale(0.9); -webkit-transform: scale(0.9); transform-origin: left; -webkit-transform-origin: left;}\n.smaller {font-size: 12.5px; display: inline-block; transform: scale(0.8); -webkit-transform: scale(0.8); transform-origin: left; -webkit-transform-origin: left;}\n.bt-text {font-size: 12px;margin: 1.5em 0 0 0}\n.bt-text p {margin: 0}\n</style>\n</head>\n<body>\n<div class=\"wrapper\">\n<header>\n<h2 class=\"title\">\nMicrosoft warns Azure customers of flaw that could have permitted hackers access to data\n</h2>\n\n<h4 class=\"meta\">\n\n\n<a class=\"head\" href=\"https://laohu8.com/wemedia/1036604489\">\n\n\n<div class=\"h-thumb\" style=\"background-image:url(https://static.tigerbbs.com/443ce19704621c837795676028cec868);background-size:cover;\"></div>\n\n<div class=\"h-content\">\n<p class=\"h-name\">Reuters </p>\n<p class=\"h-time\">2021-09-09 08:11</p>\n</div>\n\n</a>\n\n\n</h4>\n\n</header>\n<article>\n<p>SAN FRANCISCO, Sept 8 (Reuters) - Microsoft warned some of its Azure cloud computing customers that a flaw discovered by security researchers could have allowed hackers access to their data.</p>\n<p>In a blog post from its security response team, Microsoft said it had fixed the flaw reported by Palo Alto Networks and it had no evidence malicious hackers had abused the technique.</p>\n<p>It said it had notified some customers they should change their login credentials as a precaution.</p>\n<p>The blog post followed questions from Reuters about the technique described by Palo Alto. Microsoft did not answer any of the questions, including whether it was confident no data had been accessed.</p>\n<p>In an earlier interview, Palo Alto researcher Ariel Zelivansky told Reuters his team had been able to break out of Azure's widely used system for so-called containers that store programs for users.</p>\n<p>The Azure containers used code that had not been updated to patch a known vulnerability, he said.</p>\n<p>As a result the Palo Alto team was able to eventually get full control of a cluster that included containers from other users.</p>\n<p>Palo Alto reported the issue to Microsoft in July. Zelivansky said the effort had taken his team several months and he agreed that malicious hackers probably had not used a similar method in real attacks.</p>\n<p>Still, the report is the second major flaw revealed in Microsoft's core Azure system in as many weeks. In late August, security experts at Wiz described a database flaw that also would have allowed one customer to alter another's data.</p>\n\n</article>\n</div>\n</body>\n</html>\n","type":0,"thumbnail":"","relate_stocks":{"MSFT":"微软"},"is_english":true,"share_image_url":"https://static.laohu8.com/e9f99090a1c2ed51c021029395664489","article_id":"2166390651","content_text":"SAN FRANCISCO, Sept 8 (Reuters) - Microsoft warned some of its Azure cloud computing customers that a flaw discovered by security researchers could have allowed hackers access to their data.\nIn a blog post from its security response team, Microsoft said it had fixed the flaw reported by Palo Alto Networks and it had no evidence malicious hackers had abused the technique.\nIt said it had notified some customers they should change their login credentials as a precaution.\nThe blog post followed questions from Reuters about the technique described by Palo Alto. Microsoft did not answer any of the questions, including whether it was confident no data had been accessed.\nIn an earlier interview, Palo Alto researcher Ariel Zelivansky told Reuters his team had been able to break out of Azure's widely used system for so-called containers that store programs for users.\nThe Azure containers used code that had not been updated to patch a known vulnerability, he said.\nAs a result the Palo Alto team was able to eventually get full control of a cluster that included containers from other users.\nPalo Alto reported the issue to Microsoft in July. Zelivansky said the effort had taken his team several months and he agreed that malicious hackers probably had not used a similar method in real attacks.\nStill, the report is the second major flaw revealed in Microsoft's core Azure system in as many weeks. In late August, security experts at Wiz described a database flaw that also would have allowed one customer to alter another's data.","news_type":1},"isVote":1,"tweetType":1,"viewCount":234,"commentLimit":10,"likeStatus":false,"favoriteStatus":false,"reportStatus":false,"symbols":[],"verified":2,"subType":0,"readableState":1,"langContent":"EN","currentLanguage":"EN","warmUpFlag":false,"orderFlag":false,"shareable":true,"causeOfNotShareable":"","featuresForAnalytics":[],"commentAndTweetFlag":false,"andRepostAutoSelectedFlag":false,"upFlag":false,"length":2,"xxTargetLangEnum":"ORIG"},"commentList":[{"id":5799354,"commentId":"5799354","gmtCreate":1631147216278,"gmtModify":1631889321560,"authorId":4090502512947490,"author":{"id":4090502512947490,"idStr":"4090502512947490","authorId":4090502512947490,"name":"Yingyingloo","avatar":"https://static.tigerbbs.com/da58afbd656809ec183af4a539b38af6","vip":1,"crmLevel":2,"crmLevelSwitch":0,"individualDisplayBadges":[]},"repliedAuthorId":0,"objectId":889652171,"objectIdStr":"889652171","type":1,"supId":0,"supIdStr":"0","prevId":0,"prevIdStr":"0","content":"👌🏻","text":"👌🏻","html":"👌🏻","likeSize":0,"commentSize":0,"subComments":[],"verified":10,"allocateAmount":0,"commentType":"invalid","coins":0,"score":0}],"isCommentEnd":false,"isTiger":false,"isWeiXinMini":false,"url":"/m/post/889652171"}
精彩评论