SME Times is powered by   
Search News
Just in:   • Govt takes stock of shipping sector amid global maritime uncertainty  • Iran allows India-flagged tankers through Hormuz after talks between EAM Jaishankar, Araghchi  • Induction cooktops go out of stock on quick-commerce apps amid gas shortage fears  • Korean won falls against dollar as Middle East crisis drags on  • US debt surge could ripple across global economy 
Last updated: 18 Sep, 2023  

Microsoft.9.Thmb.jpg Microsoft fixes internal data exposure, says no customer data breach

Microsoft.9.jpg
   Top Stories
» Crude rally continues: Brent hits $100, WTI jumps 8 pc amid Middle East supply concerns
» India targets $100 billion textile exports by 2030-31: Giriraj Singh
» Sensex, Nifty post moderate losses over Middle East conflict
» J&K govt amends building by-laws to boost ease of doing business
» FTAs opening new markets for pharma, healthcare, and medtech sectors: Piyush Goyal
IANS | 18 Sep, 2023
Microsoft on Monday admitted that backups of two former employees’ workstation profiles and internal Microsoft Teams messages of these two employees with their colleagues were exposed accidentally, adding that no customer data was exposed.

The admission came as cloud security startup Wiz discovered a GitHub repository belonging to Microsoft’s AI research division as part of its work into the accidental exposure of cloud-hosted data.

After identifying the exposure, Wiz reported the issue to the Microsoft Security Response Center (MSRC). 

The tech giant investigated and remediated the incident involving a Microsoft employee who shared a URL for a blob store in a public GitHub repository while contributing to open-source AI learning models. 

“This URL included an overly-permissive Shared Access Signature (SAS) token for an internal storage account. Security researchers at Wiz were then able to use this token to access information in the storage account,” said Microsoft. 

“No customer data was exposed, and no other internal services were put at risk because of this issue,” the tech giant said in a blog post.

SAS tokens provide a mechanism to restrict access and allow certain clients to connect to specified Azure Storage resources. 

In this case, a researcher at Microsoft inadvertently included this SAS token in a blob store URL while contributing to open-source AI learning models and provided the URL in a public GitHub repository. 

“There was no security issue or vulnerability within Azure Storage or the SAS token feature. Like other secrets, SAS tokens should be created and managed properly. Additionally, we are making ongoing improvements to further harden the SAS token feature and continue to evaluate the service to bolster our secure-by-default posture,” Microsoft noted.

The information that was exposed consisted of information unique to two former Microsoft employees and these former employees’ workstations. 

“Customers do not need to take any additional action to remain secure,” said the company.

 
Print the Page
Add to Favorite
 
Share this on :
 

Please comment on this story:
 
Subject :
Message:
(Maximum 1500 characters)  Characters left 1500
Your name:
 

 
  Customs Exchange Rates
Currency Import Export
US Dollar
₹91.35
89.65
UK Pound
₹125.3
₹121.3
Euro
₹108.5
₹104.85
Japanese Yen ₹58.65 ₹56.8
As on 19 Feb, 2026
  Daily Poll
What is the biggest war impact on MSMEs?
 Export Disruption
 Raw Material Spike
 Freight Cost Surge
 Payment Delays
 Currency Volatility
 All
  Commented Stories
 
 
About Us  |   Advertise with Us  
  Useful Links  |   Terms and Conditions  |   Disclaimer  |   Contact Us  
Follow Us : Facebook Twitter