Today, Intel released 40 security advisories, including two side-channel issues that, if successfully exploited, may cause information disclosure. On DigitalOcean’s platform, this means a malicious user could use a Droplet to infer partial data of another Droplet on the same physical host.
To mitigate the impact of these vulnerabilities, we worked closely with Intel to thoroughly test an updated microcode and have rolled it out to all affected machines in our fleet. With this, there is no action required from users to protect their Droplets from these vulnerabilities.
Today, AMD publicly disclosed a vulnerability that affected DigitalOcean’s Premium AMD Droplets. What happened The vulnerability resulted from a bug…
Unsolicited, unwelcome, and in some cases, outright harmful communications are ever present in our interconnected world. Postal mail, email, phone,…
The security of DigitalOcean customers and their data is a responsibility we approach with utmost dedication. When our customers’ security…
How often does the Security team directly influence customer growth and user experience for the business? Unless it’s for a…
Today, Intel released 40 security advisories, including two side-channel issues that, if successfully exploited, may cause information disclosure. On DigitalOcean’s…
DigitalOcean has been monitoring the Log4j vulnerability (CVE-2021-44228) and has been testing across all of our products to validate any…