Today, Intel released 40 security advisories, including two side-channel issues that, if successfully exploited, may cause information disclosure. On DigitalOcean’s platform, this means a malicious user could use a Droplet to infer partial data of another Droplet on the same physical host.
To mitigate the impact of these vulnerabilities, we worked closely with Intel to thoroughly test an updated microcode and have rolled it out to all affected machines in our fleet. With this, there is no action required from users to protect their Droplets from these vulnerabilities.
Secrets management is a challenge that every organization must tackle, from large enterprises to small development teams. The larger the…
How often does the Security team directly influence customer growth and user experience for the business? Unless it’s for a…
Authored by Audrey Simonne and Jorge Gomez Data breaches in the services we rely on can be scary. We know…
Today, AMD publicly disclosed a vulnerability that affected DigitalOcean’s Premium AMD Droplets. What happened The vulnerability resulted from a bug…
Unsolicited, unwelcome, and in some cases, outright harmful communications are ever present in our interconnected world. Postal mail, email, phone,…
DigitalOcean has been monitoring the Log4j vulnerability (CVE-2021-44228) and has been testing across all of our products to validate any…