No classified systems involved apparently, but internal diplomatic notes, travel details, staff SSNs, etc| www.theregister.com
: How does the Azure giant come back from this?| www.theregister.com
In hindsight, it's probably good practice to give clients access to cloud logs| www.theregister.com
SUMMARY| Cybersecurity and Infrastructure Security Agency CISA
Results of Major Technical Investigations for Storm-0558 Key Acquisition| msrc.microsoft.com