Home Blog Page 81

Apple Suspends Production of M2 Series Chips Due to Sharp Drop in MacBook Demand

Apple M2

Apple faced a difficult situation in the first quarter of 2023 when it announced a dramatic reduction in revenue from its Mac devices. This forced the business to halt manufacturing its M2 series SoCs used in the current MacBook Air, MacBook Pro, and Mac mini models. According to the Elec, the manufacture of the chips was suspended early this year owing to a decline in demand for MacBooks.

At the Q1 2023 earnings release, Apple CEO Tim Cook addressed the company’s issues. Cook stated that the PC industry was declining and that Apple was experiencing issues, such as decreased sales of iPhones, wearables, and Macs. He remained hopeful, though, and believed that Apple was strategically well positioned in the market due to its competitive edge with Apple Silicon.

The M2 series chip manufacture was halted until February, and output quantities were reportedly half the previous year’s. The M2 series CPUs are a crucial component of the current MacBook models, so this was a big breakthrough for Apple. Apple’s decision to cease manufacturing was most likely triggered by a downturn in demand for MacBooks, resulting in a significant loss in Mac revenue.

Besides the difficulties, Apple announced that iPad revenue increased by 30% due to introduction of new M2-based models. This suggests that Apple’s approach of exploiting its competitive edge with Apple Silicon is working, despite a few hurdles in the short term. The company is still positive about its chances in the PC industry and will likely continue investing in Apple Silicon technology to preserve its competitive edge.

Apple Warns iPhone Users with Pacemakers to Keep Devices at a Safe Distance

iPhone collection

Apple has updated its warning for users with pacemakers or any other implanted medical device, cautioning them to keep their iPhone at least 15 centimetres away from their chest. The updated warning applies to iPhone 13, and iPhone 14, AirPods, Apple Watch, HomePod, iPad, Mac, and Beats headphones.

Magnets and the electromagnetic field emitted by the smartphone can interfere with the normal operation of such devices, potentially even leading to death. Apple also does not recommend placing any of these devices near a person’s chest with implanted cardiac devices.

While many electronic devices carry these risks, people with similar implants are usually aware. The initial warning came with the iPhone 12 in October 2020. After the American Heart Association issued a statement, Apple updated its warning to include a larger range of products.

Apple’s MagSafe technology, introduced with the iPhone 12, uses a powerful magnet under the back cover of the smartphone. This magnet can potentially interfere with the pacemaker operation’s timing and even deactivate the rescue functions of an implanted defibrillator.

All owners of such devices should be aware of the possible risks and adhere to the security requirements prescribed by Apple. In case of doubt, they should consult their physician and medical device manufacturer for further guidance.

CD Projekt Red Officially Confirms “The Witcher 4” as the Title for their Next Game in the Franchise.

CD Projekt Red The Witcher 4

The producer of the iconic video game franchise The Witcher, CD Projekt Red, has revealed that the next entry in the series, originally codenamed Polaris, will be titled The Witcher 4. While the company had previously refused the use of this title, CD Projekt Red CEO Adam Kicinski referred to the game as such in a recent financial report.

The game is being created using Unreal Engine 5 and is not expected to be completed before 2025. CD Projekt Red has also revealed a new Witcher spin-off called Canis Majoris, a sequel to their contentious 2020 release Cyberpunk 2077, and a new IP called Hadar.

But, CD Projekt Red’s recent decision to relaunch work on the Witcher spin-off, Project Sirius, has prompted concerns about the studio’s objectives. On a recent conference call, the studio stated that they “do not want to continue with projects to which we are not connected” and that Project Sirius was going through a “dramatic shift.”

CD Projekt Red’s CFO, Piotr Nielyubovich, provided more specifics on the decision, stating that the project is “new to us in terms of style and format” and differs from the developer’s “major projects.” The choice to develop a new structure for Project Sirius was “tough, but the right one,” according to Nielyubovich, as the studio aims to minimise expenses and rethink its approach to the project.

Nonetheless, it is apparent that CD Projekt Red is committed to the Witcher brand, and fans may expect a new core trilogy and a spin-off in the coming years. While the specifics of these projects are unknown, it is evident that the company is devoted to providing fans with high-quality, immersive experiences.

Twitter Publishes Some of Its Recommendation Algorithms and Machine-Learning Models on GitHub

Twitter Safety Mode

Twitter announced it would release the source code behind its recommendation algorithm that curates content for users’ “For You” timelines. The code will be open-source, but it will not contain anything related to ad recommendations, nor will it compromise Twitter’s ability to control attempts by bad actors to manipulate its platform. This move aims to increase transparency and protect user privacy and safety.

Twitter published two separate GitHub repositories containing the source code for some of its recommendation algorithms and the machine learning models that underpin them. The tweets that appear on a user’s timeline are picked by a service called Home Mixer, which uses a pipeline to get the best tweets from various recommendation sources, ranks them using a machine learning model, and applies filters to exclude NSFW content, tweets from blocked users, and those already seen.

The ultimate goal of this algorithm is to show users 50% of the most recent and relevant tweets from their followers and the remaining 50% from people outside their network based on what the user finds interesting. This approach ensures that the timeline displays tweets from diverse sources.

Earlier this month, Twitter’s source code and internal tools were publicly leaked on GitHub, prompting the company to take down the leaked code and tools. The company also requested access history information for the leaked code. It used a subpoena to compel GitHub to share the identity of the person who originally published and distributed the leaked Twitter source code.

In conclusion, Twitter’s decision to open-source its recommendation algorithm’s source code is a positive step towards transparency and user safety. By doing so; the company can ensure that bad actors cannot exploit the algorithm to manipulate the platform.

Microsoft Data Centre in the Netherlands is Causing Environmental Problems

Microsoft Filed Lawsuit Against IP Address For Illegally Activating Copies of Windows And Office

As our dependence on cloud-based online services grows, so does the demand for massive data centres to host the data. However, this trend is posing challenges in some countries. Microsoft, for example, has faced opposition from local farmers in the Netherlands for its plans to construct another hyperscale data centre in the region.

Hyperscale data centres, typically over 10,000 square feet, are necessary to meet the growing demands of cloud-based services. However, they are also raising environmental concerns in the Netherlands, such as land occupancy and nitrogen emissions. The Dutch government implemented regulations in 2022 to restrict such constructions in most parts of the country, but Microsoft was granted an exemption for its ongoing project.

Despite the exemption, the construction of the new data centre has met with resistance from the local community, especially farmers concerned about the project’s impact on the environment and their livelihoods. The Netherlands is currently grappling with nitrogen pollution, emitting four times more nitrogen than the rest of the EU. The government has set a target to halve its emissions by 2030. After investigating its potential nitrogen emissions, Microsoft’s project has been granted a “clear judgment” from the local environmental agency.

However, this assurance has not calmed the worries of local farmers who feel that large tech companies are taking over their lands. “There’s a lot of criticism that the landscape is changing,” said Jeroen Candel, an associate professor of food and agricultural policy at Wageningen University in the Netherlands. Many local farmers are concerned about the impact on their communities and whether the construction of data centres is worth the environmental and social costs.

The construction of hyperscale data centres will likely continue, especially with the rise of AI-based services like Microsoft’s BingAI Chat. However, it is crucial to address such constructions’ environmental and social impact before it is too late. The Netherlands is just one example of how the demand for data centres poses challenges in countries worldwide. It is time for governments, tech companies, and local communities to work together to find sustainable solutions that balance the need for technological advancement with protecting the environment and local communities.

8 Best Anonymous Browsers To Protect Online Privacy (Updated 2023)

Best anonymous browsers to protect online privacy

Why should we consider start using anonymous browsers instead of regular ones?

The answer is clear, today, when we are online nothing, is private, in fact, now online privacy is a joke and our private browsing data has been using for business purposes like advertising. We are been tracked by Google, by our ISP, our government and hundreds of data collectors.

Everyone likes to know what we are doing online, which websites are we visiting and use this information against us. The hard truth is — today we can’t be fully anonymous.

But we can reduce the impact to some extent by following some quick measures that will diminish leaked information footprint and (almost) secure our online privacy. In this article, we are going to list a similar measure to protect your browsing data.

The primary safeguarding starts with from the web browser itself, as its the main portal connecting you to the internet. It’s the place where it all starts. So to protect your online privacy, first, you have to replace your web browser with a more secure one — something that makes your browsing anonymous.

And below we are listing the best anonymous browsers which you can trust and hide your browsing habits from spying eyes — most of them are open-source projects. These secure browsers will prevent somebody watching your internet connection from learning what sites you visit, it stops sites you visit from learning your physical location and lets you access sites which are blocked.

Anonymous browsers to protect online privacy:

1. Tor Browser

Best anonymous browsers to protect online privacy

When it comes to anonymous browsing, none can beat Tor. The privacy browser Tor protects you by sending your internet traffic and communications around a distributed network of relays run by volunteers all around the world. Like instead of directing traffic from A to B, Tor browser actually bounces it multiple times through different locations. By this way, no one could possibly tell where the traffic originated or where it’s going.

In fact, US Navy and many other government organizations use Tor browser to gather intelligence and visit dark web or other websites without leaving any digital footprints or government IP addresses in the site’s log makes Tor one of the most secure web browsers and best open-source alternative to Google Chrome.

Actually, Tor is built on top of Firefox with a lot of modifications to improve security and privacy. This anonymous browser comes with NoScript integration by default.

The only downside of Tor browser is its speed. Because of bouncing of internet traffic to multiple tunnels before getting to the destination makes Tor browser less fast than other anonymous browsers. But it wouldn’t be an issue if you are using a speedy internet connection. However, when it comes to the protection of online privacy — nothing matters.

Available on: Windows, Mac, Linux

2. Epic Privacy Browser

Best anonymous browsers to protect online privacy

Epic browser is a Chromium-based anonymous web browser comes with the ability to stop 600+ tracking attempts in an average browsing session. Epic restricts websites from showing ads, fingerprinting, crypto mining, ultrasound signaling and more.

When you’re using Epic with an encrypted proxy on, your data is encrypted and hidden from the government, from your ISP, from Google and from hundreds of data collectors. And when you close the Epic browser after internet surfing, it automatically deletes the browsing history, cookies, web cache, databases, web, Flash & Silverlight cookies — literally everything that compromises your privacy.

Available on: Windows, Mac

3. Comodo Dragon / Ice Dragon

Best anonymous browsers to protect online privacy

Comodo created two flavors of anonymous browsers. One named Comodo Dragon — a Chromium-based secure web browser comes with all of Chrome’s features plus an unparalleled level of security and privacy. And the other is named Comodo IceDragon — based on Mozilla Firefox which features several security, performance and feature enhancements over the core build.

Both these Comodo privacy web browsers possess top-level security features to anonymize your browsing data from a third party. One of the notable features available on the free version is the virtualized mode that isolates the browser from the host system. This can be attained by installing Comodo’s free antivirus software, Comodo Internet Security (CIS).

Available on: Windows, Mac, Linux

4. SRWare Iron

Best anonymous browsers to protect online privacy

SRWare Iron — another one of the best private browsers based on the open-source Chromium project. The secure browser offers the same features as Chrome — but without the critical points that the privacy concern. It primarily aims to eliminate usage tracking and other privacy-compromising functionality that the Google Chrome browser includes.

Available on: Windows, Mac, Linux, Android

5. Brave

Best anonymous browsers to protect online privacy

Brave — the fastest anonymous browser to protect your privacy. Brave by default blocks ads and trackers, and reduces your chances of being infected by malware, ransomware and spyware.

Available on: Windows, Mac, Linux, Android, iOS

6. LibreWolf

LibreWolf secure browser

LibreWolf is an independent fork of Firefox, with the primary goals of privacy, security and user freedom. This secure browser comes with increased protection against tracking — by enabling Mozilla Tracking Protection and fingerprinting techniques. Also, LibreWolf only accommodated private search engines like Duck Duck Go and SearX to protect user privacy.

Available on: Windows, Mac, Linux

7. Dooble

Dooble private browser

Dooble is a free and open-source anonymous web browser that was created to improve privacy and security. Dooble uses Qt for its user interface and abstraction from the operating system and processor architecture. As a result, Dooble should be portable to any system that supports OpenSSL, POSIX threads, Qt, SQLite, and other libraries. Most of the data that Dooble retains is stored using authenticated encryption. Dooble does not encode file associations and user settings. Dooble also provides a session-based model using temporary keys. The passphrase may be modified without the loss of data.

Available on: FreeBSD, Linux, OS X, OS/2, and Windows.

8. Tails

Tails privacy-focused browser

Tails is another best privacy-focused browser that aims at preserving your privacy and anonymity. Tails use the Internet anonymously and circumvent censorship and all connections to the Internet are forced to go through the Tor network. Tails also make it sure to leave no trace on the computer you are using unless you ask it explicitly. This secure browser uses state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.

Available on: Windows, macOS and Linux

Making anonymous browsers as your primary medium to surf the internet is only the initial step. Soon we will share more privacy protection measures like VPN services, proxies, and even secure operating systems to shield you from online espionage.

Also if we forget to add some other anonymous browsers, please kindly mention them in comments.

4 Ways to Recover Deleted Files from Mac

Recover Deleted Files from Mac

No matter how careful you are with your Mac, it is always possible to accidentally delete important files. It’s a frustrating when it happens. Whether it’s a work document or a cherished family photo, the loss of data can be devastating. Fortunately, there are ways to recover deleted files from a Mac. In this article, we will discuss the various methods of recovering deleted files from a Mac. We will discuss each method in detail and provide a step-by-step guide to recover the deleted files from Mac. We will also share a few helpful tips to prevent data loss in the future.

Method 1. Cancel Deletion with Undo Option

If you have deleted an important file on your Mac accidentally, you can restore them easily with the “Undo Option.” As the name implies, this command reverses your last completed action. However, you should immediately do this after removing a file. It won’t be helpful if you permanently delete the file or empty your trash.

You can recover a deleted file on Mac by following the simple steps below: 

  1. When you delete a file, go to the “Edit” option and click on “Undo Move.”
  2. You can even use the command + Z option to undo your deletion.
No matter how careful you are with your Mac, it is always possible to accidentally delete important files. It’s a frustrating when it happens. Whether it’s a work document or a cherished family photo, the loss of data can be devastating. Fortunately, there are ways to recover deleted files from a Mac. In this article, we will discuss the various methods of recovering deleted files from a Mac. We will discuss each method in detail and provide a step-by-step guide to recover the deleted files from Mac. We will also share a few helpful tips to prevent data loss in the future. Method 1. Cancel Deletion with Undo Option If you have deleted an important file on your Mac accidentally, you can restore them easily with the “Undo Option.” As the name implies, this command reverses your last completed action. However, you should immediately do this after removing a file. It won’t be helpful if you permanently delete the file or empty your trash. You can recover a deleted file on Mac by following the simple steps below: When you delete a file, go to the “Edit” option and click on “Undo Move.” You can even use the command + Z option to undo your deletion. These two methods can help you retrieve a deleted file that is not permanently deleted. After this process, you can get back your lost files. If you have emptied the trash, you can try the next method to recover your deleted files. Method 2. Restore Deleted Files from Mac Trash Can When you find a file is missing from your Mac, you should first check the Trash Can. It is a folder that stores deleted files temporarily until emptied. If the deleted file is in the Trash Can, it can be recovered to its original place with some clicks. Trash Can holds the deleted file until you do not empty it or remove it with the Mac’s “Delete Immediately” option. Your chance of recovering the deleted file from Mac will become null if you empty the Trash Bin without restoring your file to its original location. Here is how to restore a deleted file from Trash Can on Mac: Go to Trash. Locate your file for recovery. Find the file based on its name, type, size, and date modified. Enter your file name in the Search Bar. On identifying your file for recovery, choose it. Right-click and select ‘Put Back’ for instant file recovery. Recovering a deleted file from Trash Can is simple, but it needs you to perform suitable action. Also, not every deleted file ends up in the trash. If you did not find your deleted file in Trash, try the next option for deleted file recovery. Method 3. Restore Deleted Files with Time Machine Time Machine is the native application on MacOS that creates backups automatically. These backups let you restore deleted files in an emergency. Use Time Machines as a part of your routine maintenance schedule to back up your valuable data. A backup can be helpful if you find that you have deleted a file and emptied your Trash. Once Configured, this application will back up your applications and personal files regularly. You need an external device for storage, like a USB drive or an external hard drive with enough storage space. Hook this external device up and navigate to your System Preferences. Choose Time Machine and then Select back-up disk. Also, you can choose the external drive and turn automatic backups on. Thus, users of Mac can utilize time Machine to recover files of any specific type from backups or restore their Mac to a properly working Mac OS. To restore a deleted file with Time Machine, follow the steps below: Click time Machines from the menu bar of MacOS Enter Time Machine Navigate to the date before you deleted the file. Locate the file from the back-ups Finder Window. Preview the file, choose the deleted file, and click Restore. The deleted file will come to its original folder. This method will work if you have created backups of your files previously. It is a good idea to back up important files to avoid data loss during accidental deletion, system failure, etc. Time Machine can also fail to recover some deleted files on Mac if they are damaged/ corrupt or if they were not backed up. In this case, go with the method of using data recovery software. Method 4. Recover Permanently Deleted Files with Data Recovery. What if you cannot recover the deleted files using Undo Option, Time Machine, or Trash? Luckily, files that are permanently deleted can be recovered on Mac. With some luck and specialized data recovery software like iBeesoft Mac Data Recovery, you can discover and recover permanently deleted files on Mac. It is a free, outstanding data recovery software that can be used to recover deleted or lost files from external storage devices and internal hard drives. It is an outstanding choice for effective and reliable data recovery solutions on Mac. iBeesoft Data Recovery allows users to scan and display all the recoverable files. The main features of iBeesoft Data Recovery For Mac include: Restore Lost Data In Over 500 Scenarios Recover Over 1000 File Formats Fix Corrupted Images/ Videos Retrieve Data From Over 2000 Storage Devices Here is how you can recover deleted files on Mac using iBeesoft Data Recovery: Download and install iBeesoft Data Recovery for Mac Launch it Click “Start” To save your scanning time, uncheck file types Choose the volume and disk from where your files were deleted Click “Scan” Connect the external hard drive if you wish to retrieve files from it Let the scanning process complete Choose the target file. Click “Recover” and save the chosen file. Regardless of what type of files you want to recover, this data recovery software covers you. From videos and photos to emails and documents, it supports more than 1000 file formats. Summary Follow the different ways mentioned above and you will have a great chance to get your deleted files back on Mac. Start the file recovery process the moment you notice any missing file as quick actions can undelete a file with just an undo command. Other methods include recovering deleted files from Mac Trash Can or using Time Machine. If none of these methods work, we recommend using iBeesoft Data Recovery for Mac. Whether you want to retrieve vital work documents or lost family photos on Mac, this software is the perfect option for comprehensive and dependable recovery. Now you know the four best ways to restore your deleted files on Mac. If you have concluded that a few files cannot be recovered, you may think what can be done to prevent data loss in the future. Below are a few tips to avoid data loss on Mac: Back up the Mac Back up the Mac With Time Machine Limit useless access to The Mac For Extra Protection, Use Cloud Back Up These steps are vital to protect your data on Mac. Those who don’t protect their data on Mac will end up with potential data loss.

These two methods can help you retrieve a deleted file that is not permanently deleted. After this process, you can get back your lost files. If you have emptied the trash, you can try the next method to recover your deleted files.

Method 2. Restore Deleted Files from Mac Trash Can

When you find a file is missing from your Mac, you should first check the Trash Can. It is a folder that stores deleted files temporarily until emptied. If the deleted file is in the Trash Can, it can be recovered to its original place with some clicks. Trash Can holds the deleted file until you do not empty it or remove it with the Mac’s “Delete Immediately” option. Your chance of recovering the deleted file from Mac will become null if you empty the Trash Bin without restoring your file to its original location.

Here is how to restore a deleted file from Trash Can on Mac: 

  1. Go to Trash.
  2. Locate your file for recovery.
  3. Find the file based on its name, type, size, and date modified.
  4. Enter your file name in the Search Bar.
  5. On identifying your file for recovery, choose it.
  6. Right-click and select ‘Put Back’ for instant file recovery.
deleted file from Trash

Recovering a deleted file from Trash Can is simple, but it needs you to perform suitable action. Also, not every deleted file ends up in the trash. If you did not find your deleted file in Trash, try the next option for deleted file recovery.

Method 3. Restore Deleted Files with Time Machine

Time Machine is the native application on MacOS that creates backups automatically. These backups let you restore deleted files in an emergency. Use Time Machines as a part of your routine maintenance schedule to back up your valuable data. A backup can be helpful if you find that you have deleted a file and emptied your Trash. Once Configured, this application will back up your applications and personal files regularly.

You need an external device for storage, like a USB drive or an external hard drive with enough storage space. Hook this external device up and navigate to your System Preferences. Choose Time Machine and then Select back-up disk. Also, you can choose the external drive and turn automatic backups on. Thus, users of Mac can utilize time Machine to recover files of any specific type from backups or restore their Mac to a properly working Mac OS.

To restore a deleted file with Time Machine, follow the steps below: 

  1. Click time Machines from the menu bar of MacOS
  2. Enter Time Machine
  3. Navigate to the date before you deleted the file.
  4. Locate the file from the back-ups Finder Window.
  5. Preview the file, choose the deleted file, and click Restore.
  6. The deleted file will come to its original folder.
deleted file with Time Machine

This method will work if you have created backups of your files previously. It is a good idea to back up important files to avoid data loss during accidental deletion, system failure, etc. Time Machine can also fail to recover some deleted files on Mac if they are damaged/ corrupt or if they were not backed up. In this case, go with the method of using data recovery software.

Method 4. Recover Permanently Deleted Files with Data Recovery.

What if you cannot recover the deleted files using Undo Option, Time Machine, or Trash? Luckily, files that are permanently deleted can be recovered on Mac. With some luck and specialized data recovery software like iBeesoft Mac Data Recovery, you can discover and recover permanently deleted files on Mac. It is a free, outstanding data recovery software that can be used to recover deleted or lost files from external storage devices and internal hard drives. It is an outstanding choice for effective and reliable data recovery solutions on Mac. iBeesoft Data Recovery allows users to scan and display all the recoverable files. The main features of iBeesoft Data Recovery For Mac include:

  • Restore Lost Data In Over 500 Scenarios
  • Recover Over 1000 File Formats
  • Fix Corrupted Images/ Videos
  • Retrieve Data From Over 2000 Storage Devices

Here is how you can recover deleted files on Mac using iBeesoft Data Recovery: 

  1. Download and install iBeesoft Data Recovery for Mac
  2. Launch it
  3. Click “Start”
  4. To save your scanning time, uncheck file types
  5. Choose the volume and disk from where your files were deleted
  6. Click “Scan”
  7. Connect the external hard drive if you wish to retrieve files from it
  8. Let the scanning process complete
  9. Choose the target file. Click “Recover” and save the chosen file.
recover deleted files on Ma

Regardless of what type of files you want to recover, this data recovery software covers you. From videos and photos to emails and documents, it supports more than 1000 file formats.

Summary 

Follow the different ways mentioned above and you will have a great chance to get your deleted files back on Mac. Start the file recovery process the moment you notice any missing file as quick actions can undelete a file with just an undo command. Other methods include recovering deleted files from Mac Trash Can or using Time Machine. If none of these methods work, we recommend using iBeesoft Data Recovery for Mac. Whether you want to retrieve vital work documents or lost family photos on Mac, this software is the perfect option for comprehensive and dependable recovery.

Now you know the four best ways to restore your deleted files on Mac. If you have concluded that a few files cannot be recovered, you may think what can be done to prevent data loss in the future. Below are a few tips to avoid data loss on Mac:

  • Back up the Mac
  • Back up the Mac With Time Machine
  • Limit useless access to The Mac
  • For Extra Protection, Use Cloud Back Up

These steps are vital to protect your data on Mac. Those who don’t protect their data on Mac will end up with potential data loss.

Bing’s Security Compromised Due to Azure Misconfiguration

Microsoft Bing Security Compromised

Microsoft’s Bing search engine has been in the news lately due to the launch of Bing Chat. However, before this launch, security researchers at Wiz discovered a major flaw in Microsoft’s cloud computing platform, Azure, that compromised Bing’s security.

Wiz’s Hillai Ben-Sasson revealed their findings in a recent Twitter thread, stating that they discovered “an odd Azure configuration” in January. They found a vulnerability in the Azure Active Directory (AAD) identity and access management service, which allowed them to access Microsoft’s Bing Trivia feature without authentication. This flaw enabled hackers to obtain personal information from Bing users, such as Outlook emails and Teams chats, by issuing Office tokens to all logged-in users.

According to Wiz Chief Technology Officer Ami Luttwak, the exploit could have been used by a state trying to influence public opinion or a hacker with financial motives. Fortunately, Microsoft has addressed the issues Wiz reported in Azure and Bing. In a blog post, Microsoft stated that Azure AD had been updated to stop issuing access tokens to clients not registered in the resource tenant. This should prevent this issue if the application does not handle authentication checks correctly.

Although Wiz did not find any evidence of exploitation before the patch was released, they suggest that organizations using Azure Active Directory applications review their application logs for suspicious logins that indicate a security breach.

In recognition of their efforts, Microsoft rewarded Wiz with $40,000 for finding and reporting the flaw. This highlights the importance of responsible disclosure of vulnerabilities to ensure they are addressed quickly and efficiently.

In conclusion, the recent discovery of a vulnerability in Azure by Wiz serves as a reminder of the importance of robust security measures in cloud computing platforms. With Microsoft quickly addressing the issues, it is a testament to its commitment to ensuring the safety and security of its users’ data. However, organizations should also take proactive steps to review their application logs to identify suspicious activity and prevent future security breaches.