More sensitive information has sloshed from another unsecured Amazon Web Services S3 bucket. This time the exposed data belonged to the US Army's Intelligence and Security Command (INSCOM), that Service's component of the National Security Agency's Central Security Service. The exposed database was found (again) by researchers from UpGuard, which says this is the first time it's found classified information exposed by such an easily avoided configuration error. ZDNet says this latest exposure is by its reckoning the fifth case of NSA data loss in the past five years.
No one is quite sure, yet, to whom the AWS S3 bucket belonged, and it seems unlikely that this is a case of deliberate leaking as opposed to simple carelessness, but the story is likely to bring Congressional pressure for intensified mole-hunting in the Intelligence Community.
Misconfigurations haven't yet slowed the apparently inexorable move of sensitive information into cloud services. CIA continues to believe the cloud represents both cost savings and better security.
Apple is fixing a major problem with MacOS High Sierra. The recently upgraded operating system allows root access by typing "root." Mac users shouldn't delay fixing their systems.
Alleging information aggression from Washington, Moscow says it's going to build its own DNS. This is Russia's latest move in the direction of information autarky.
Russia is partnering with Venezuela to keep the Catalan independence controversy roiling.
SWIFT, the international funds transfer system, warned banks yesterday that cyberattacks on the financial systems are growing rapidly more frequent, sophisticated, and rapacious.