We are reviewing our development processes to help prevent a similar issue occurring in the future.” What Information Was Revealed? ![]() We promptly shut down the misconfigured environment, addressing the vulnerability. “Late last week, Adobe became aware of a vulnerability related to work on one of our prototype environments. They reported it to Adobe, and Adobe's security team was able to close the breach that day.Īdobe's team then publicly addressed the breach in a blog post this week: The breach was discovered by researcher Bob Diachenko from Security Discovery and tech journalist Paul Bischoff of CompariTech on October 19. Elasticsearch is a type of database designed for the easy hosting and management of documents and semi-structured data, making it a potential target for an opportunistic scammer. The data was left exposed and not password-protected in an online-accessible Elasticsearch database. In other words, those with an Adobe Creative Cloud subscription should be wary when checking their email, as internet scammers might have access to millions of Adobe user emails. While it's uncertain whether or not these details have actually made it into the public domain, it's healthy to act with a little caution. The company was quick to address the issue when informed, but not before the details of its users had been exposed. ![]() ![]() The exposed data didn't include any passwords or financial details, but did include email addresses. The private information of almost 7.5 million Adobe Creative Cloud users has been exposed in a new security breach.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |