The ARMy grows
Source: AMD: We Stand Ready To Make Arm Chips | Tom’s Hardware
The pandemic has uprooted life for everyone, from distributors to sellers to consumers; and with this change in the economy, a heavier dependence on digitalization has formed. Businesses across industries have placed a concentrated effort on transforming their digital presence to meet the growing needs of hungry consumers accustomed to instant gratification.

Für ein Sandwich aus dem Sandwich-Toaster unterwegs auf dem Plastik-Highway in die CO2-Hölle.
This week, again Azure makes the news with cloud security issues. Following the linked article, Microsoft secretly installed a “management agent” on customer VMs. As if the act itself was not severe enough, the agent is reachable from the network.
Source: “Secret” Agent Exposes Azure Customers To Unauthorized Code Execution | Wiz Blog
And, if this does not seem bad enough, the said agent will an attacker root access when the authentication header is missing:
When working with the cloud, do your threat modelling before choosing a vendor.

The Apple-Car has been a rumor for years. And mobility is one of the hottest bets for the future. Car manufacturers, in particular premium brands, are in a good position to defend their pool position. The techradar.com news therefore does not sound surprising. At all.
Some Apple gossip is pure fantasy, but some of the hearsay has roots in the real world. The Apple car falls into the latter category, and if a new report from Korean site mk.co.kr is accurate, the company now plans to shoulder the entire development process of the autonomous and/or electric car on its own.
Source: techradar.com
Travis-CI published a security bulletin the other day, describing a special condition that would allow to access secrets belonging to a foreign repository in Github or Bitbucket. The condition requires a fork from a public repository. That’s how open source work, and very central functionality. Not a corner case.
Turns out, the cloud service did address the issue, still plenty of secrets have been affected:
While cloud technology is all great economically, this is another sample of why commercial software vendors need to consider third party vendors in their threat profiles.

