SME Times is powered by   
Search News
Just in:   • Adani Group’s Ambuja Cements acquires 47 pc stake in Orient Cement for Rs 8,100 crore  • India’s enterprise ICT market to reach $354 billion in 2028  • India’s growth story remains intact, real GDP likely to grow at 7.2 pc in FY25: RBI Guv  • Extension of ‘Udan’ scheme to further improve unserved air routes in India  • Expansion of BRICS has added to its inclusivity and agenda for global good: PM Modi 
Last updated: 18 Sep, 2023  

Microsoft.9.Thmb.jpg Microsoft fixes internal data exposure, says no customer data breach

Microsoft.9.jpg
   Top Stories
» Adani Group’s Ambuja Cements acquires 47 pc stake in Orient Cement for Rs 8,100 crore
» India’s growth story remains intact, real GDP likely to grow at 7.2 pc in FY25: RBI Guv
» Extension of ‘Udan’ scheme to further improve unserved air routes in India
» Expansion of BRICS has added to its inclusivity and agenda for global good: PM Modi
» Vision for developed India by 2047 part of the mindset: PM Modi
IANS | 18 Sep, 2023
Microsoft on Monday admitted that backups of two former employees’ workstation profiles and internal Microsoft Teams messages of these two employees with their colleagues were exposed accidentally, adding that no customer data was exposed.

The admission came as cloud security startup Wiz discovered a GitHub repository belonging to Microsoft’s AI research division as part of its work into the accidental exposure of cloud-hosted data.

After identifying the exposure, Wiz reported the issue to the Microsoft Security Response Center (MSRC). 

The tech giant investigated and remediated the incident involving a Microsoft employee who shared a URL for a blob store in a public GitHub repository while contributing to open-source AI learning models. 

“This URL included an overly-permissive Shared Access Signature (SAS) token for an internal storage account. Security researchers at Wiz were then able to use this token to access information in the storage account,” said Microsoft. 

“No customer data was exposed, and no other internal services were put at risk because of this issue,” the tech giant said in a blog post.

SAS tokens provide a mechanism to restrict access and allow certain clients to connect to specified Azure Storage resources. 

In this case, a researcher at Microsoft inadvertently included this SAS token in a blob store URL while contributing to open-source AI learning models and provided the URL in a public GitHub repository. 

“There was no security issue or vulnerability within Azure Storage or the SAS token feature. Like other secrets, SAS tokens should be created and managed properly. Additionally, we are making ongoing improvements to further harden the SAS token feature and continue to evaluate the service to bolster our secure-by-default posture,” Microsoft noted.

The information that was exposed consisted of information unique to two former Microsoft employees and these former employees’ workstations. 

“Customers do not need to take any additional action to remain secure,” said the company.

 
Print the Page
Add to Favorite
 
Share this on :
 

Please comment on this story:
 
Subject :
Message:
(Maximum 1500 characters)  Characters left 1500
Your name:
 

 
  Customs Exchange Rates
Currency Import Export
US Dollar
84.35
82.60
UK Pound
106.35
102.90
Euro
92.50
89.35
Japanese Yen 55.05 53.40
As on 12 Oct, 2024
  Daily Poll
Will the new MSME credit assessment model simplify financing?
 Yes
 No
 Can't say
  Commented Stories
 
 
About Us  |   Advertise with Us  
  Useful Links  |   Terms and Conditions  |   Disclaimer  |   Contact Us  
Follow Us : Facebook Twitter