Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • How to decide which one chooses
    • Tarangy National Park: The hidden jewel of Tanzania
    • 15 Something to do around Chautauqua Lake, New York – a short drive from Buffalo, Cleveland, or Pitsburgh
    • Discover the magic of relaxation and rich history of hot springs, Arkansas: a perfect mix of nature and culture
    • Level8 Creator Carry -A – Best Luggage for Modern Travel
    • The area revolves around: an exciting and friendly way to try Atlanta
    • 15 things I hope to know before visiting the ball in Las Vegas
    • Summer 2022, sixth week – practical life laboratory from Robin Camarriot
    Facebook X (Twitter) Instagram
    ZEMS BLOG
    • Home
    • Sports
    • Reel
    • Worklife
    • Travel
    • Future
    • Culture
    • Politics
    • Weather
    • Financial Market
    • Crypto
    ZEMS BLOG
    Home » US government report on Chinese hacking says Microsoft's security culture was inadequate and needed an overhaul
    Culture

    US government report on Chinese hacking says Microsoft's security culture was inadequate and needed an overhaul

    ZEMS BLOGBy ZEMS BLOGApril 3, 2024No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A review panel appointed by the Biden administration criticized Microsoft over a Chinese hacking attack last year. In a scathing indictment of Microsoft's security and transparency, the report said a “series of mistakes” by the tech giant allowed state-backed Chinese internet operators to break into the email accounts of senior US officials including Commerce Secretary Gina Raimondo.

    According to a report by the AP, the Cyber ​​Safety Review Board, created in 2021 by executive order, describes poor cybersecurity practices, a lax company culture, and a lack of honesty about the company's knowledge of the targeted hacking breach.

    The report is said to have concluded that “Microsoft's security culture was inadequate and required a comprehensive overhaul” given the company's reach and critical role in the global technology ecosystem. Microsoft products support “essential services that support national security, the foundations of our economy, and public health and safety.”

    Report: A series of avoidable mistakes led to the Chinese hack The committee said in its report that the hack “could have been prevented and should never have happened,” and blamed its success on “a series of mistakes that could have been avoided.” The board also said that Microsoft still does not know how the hackers got in.

    In its recommendations, the committee urged Microsoft to suspend adding features to its cloud computing environment until “significant security improvements are made.” It also asked Microsoft CEO Satya Nadella and the board to bring about “rapid cultural change,” including publicly sharing a plan with specific timelines to make fundamental security-focused reforms across the company and its full suite of products.

    What Microsoft said in the report
    In response to the report, Microsoft said in a statement that it appreciated the board's investigation and would continue to “harden all of our systems against attack and implement more robust sensors and logs to help us detect and repel our adversaries' cyber armies.”

    As a reminder, Chinese state-backed hackers compromised the Microsoft Exchange Online email of 22 organizations and more than 500 individuals around the world, including the US Ambassador to China, Nicholas Burns. The 34-page report claimed that the attack affected several US agencies that do business with China. The hackers reportedly had access to some cloud email inboxes for at least six weeks and downloaded more than 60,000 emails from the State Department alone. The Chinese hack was initially revealed in July 2023 by Microsoft in a blog post and was carried out by a group the company calls Storm-0558.

    broadens


    Microsoft noted in its statement that the hackers involved are “nation-state threat actors who are well-resourced and operate continuously and without meaningful deterrence.”

    Source link

    ZEMS BLOG
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleBitcoin (BTC) price fell to $66,000 as rising Treasury yields attracted investor interest
    Next Article What is peer-to-peer cryptocurrency?
    ZEMS BLOG
    • Website

    Related Posts

    Pune Cyber ​​Police Station introduces cyber office work culture

    April 14, 2024

    Principled conservatism leads to a culture of performance

    April 14, 2024

    J&K LG flagged off Mata Vaishno Devi Pracheen Marg Yatra

    April 14, 2024
    Leave A Reply Cancel Reply

    How to decide which one chooses

    May 9, 2025

    Tarangy National Park: The hidden jewel of Tanzania

    May 2, 2025

    15 Something to do around Chautauqua Lake, New York – a short drive from Buffalo, Cleveland, or Pitsburgh

    April 22, 2025

    Discover the magic of relaxation and rich history of hot springs, Arkansas: a perfect mix of nature and culture

    April 21, 2025
    Recent Posts
    • How to decide which one chooses
    • Tarangy National Park: The hidden jewel of Tanzania
    • 15 Something to do around Chautauqua Lake, New York – a short drive from Buffalo, Cleveland, or Pitsburgh
    • Discover the magic of relaxation and rich history of hot springs, Arkansas: a perfect mix of nature and culture
    • Level8 Creator Carry -A – Best Luggage for Modern Travel
    About

    ZEMS BLOG in partnership with Holiday Omega keeps you informed. Bringing you the latest news from around the world with fresh perspectives and unique insights. Your daily source for news from around the world. All perspectives, all curated for a global audience.

    Facebook X (Twitter) Instagram YouTube Telegram
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    Subscribe For latest updates

    Type above and press Enter to search. Press Esc to cancel.