32 Terabytes of Microsoft Data Leaked, Amazon Hits Back at Walmart and More in This Week’s News

Massive Microsoft Leak

A 32 TB archive of Windows 10 builds as well as source codes for private software has been leaked online. As claimed by the Register, the leak could start a wave of Windows 10 exploits.

The files were uploaded to the BetaArchive website. They contain Windows Server 2016 and Windows 10 builds, created for testing purposes.

Book a demo today to see GlobalDots is action.

Optimize cloud costs, control spend, and automate for deeper insights and efficiency.

Book a demo today to see GlobalDots is action.

Microsoft has since confirmed that a part of the source code for their popular OS has been leaked online.

Facade of a Microsoft store with a large window displaying colorful panels and the Microsoft logo.

Read More:

Register, Hacker News

AWS Warns Walmart Not to Influence Business Partners’ Cloud Choices

Last week, AWS stated that retail powerhouse Walmart is pushing their partners to avoid AWS services. Upon the recent acquisitions of Whole Foods, Amazon has entered the grocery arena setting itself as competitors to Walmart.

It appears that Walmart is pushing its tech partners to opt for Azure cloud services for computing, storage, security and development tools. Amazon stated that AWS is a completely separate entity and shouldn’t be shunned because of Amazon’s retailing division.

The retail giant has since denied any involvement in such talks.

Logo of Amazon Web Services featuring stylized cubes and the text 'amazon web services'.

Read More:

Cloud Pro, BBC

Imperva Upgrades Their CDN Platform

Major improvements have been announced by Imperva. The company said they were going through with some notable enhancements to their Incapsula CDN platform.

The platforms will get a freshening up with a new cache storage layer, fast content switching and enhanced bot management.

The storage architecture, rules engine and bot management enhancements are Imperva’s strongest cards in their game to exceed $200 mil in annual revenue.

Logo of Incapsula,featuring a stylized representation with text and a green triangular shape.

Read More:

Bizety, Business Wire

WannaCry Hits Honda & Australian Traffic Light Camera System

Just over a month after the ransomware epidemic, WannaCry hits again. The latest victims is the automotive giant Honda (along with some 55 speed and traffic light cameras in Australia).

By leveraging NSA’s EternalBlue exploit, WannaCry managed to infect over 300 000 Windows systems within just 72 hours on 12th of May.

Upon infection, the automaker had to halt production for over 24 hours in its Satama facilities. Another victim were 55 red light and traffic cameras in Australia. The Victoria Police disclosed that they believe the infection was a targeted cyber attack, and that the worm gained access through a USB drive.

A close-up of a Honda dealership sign against a cloudy sky.

Read More:

Hacker News, Reuters

FBI Releases IC3 Report

According to FBI’s latest Internet Crime Complaint Center report, the most costly cyber frauds last year were online extortion, tech support scam and phishing attacks crafted to spoof the boss.

According to the IC3, ransomware-related complaints totaled slightly more than $2.4 mil in losses. The estimated value is by far underscored as it’s proven that only an estimated 15% of US fraud victims report the crimes to law enforcement.

C3 reported 17,146 extortion-related complaints, some 10,850 tech support frauds and slightly above than 12,000 reports about CEO fraud attacks (e-mail scam where the attacker spoofs the boss).

A person sitting in front of a computer screen displaying the logo of the FBI's Internet Crime Complaint Center (IC3).

Read More:

KrebsOnSecurity, IC3 Report (pdf)

Latest Articles

What is an API Security Audit?

 In January 2024, a misconfigured API exposed 650,000 private messages. These included passwords and internal communications. No exploit chain. No zero-day. Just a public-facing endpoint with no authentication. This wasn’t an isolated incident. From T-Mobile and Twitter (now X) to Kronos Research and the US Treasury, attackers have consistently used APIs as entry points. They […]

Ganesh The Awesome
26th June, 2025
The Ultimate API Security Checklist for 2025

APIs are now the top attack vector in enterprise apps. In 2024 alone, breaches tied to APIs cost an average of $4.88 million, and that number is rising fast. Attackers exploit gaps in API authentication, input validation, and outdated endpoints to compromise systems. Legacy controls no longer suffice, and the OWASP API Top 10 outlines […]

Ganesh The Awesome
26th June, 2025
10 API Security Best Practices for 2025

APIs are the backbone of today’s interconnected software. They power everything from mobile apps and SaaS platforms to internal microservices and partner integrations. But their rapid growth has left many security teams flat-footed. In 2025, many attackers prefer to exploit API misconfigurations hiding in plain sight. What used to be fringe cases (token leakage, zombie […]

Ganesh The Awesome
23rd June, 2025
API Security in 2025: Practical Assessment & Modern Protection Strategies

APIs are no longer an edge case. In 2025, they’re a core requirement for maintaining trust, compliance, and operational continuity. As organizations build more API-driven systems—from customer apps to internal microservices—the exposure risk compounds. And quickly, too. Even mature security teams are finding that traditional tools can’t keep pace with the volume, velocity, and nuance […]

Ganesh The Awesome
23rd June, 2025

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.

    GlobalDots' industry expertise proactively addressed structural inefficiencies that would have otherwise hindered our success. Their laser focus is why I would recommend them as a partner to other companies

    Marco Kaiser
    Marco Kaiser

    CTO

    Legal Services

    GlobalDots has helped us to scale up our innovative capabilities, and in significantly improving our service provided to our clients

    Antonio Ostuni
    Antonio Ostuni

    CIO

    IT Services

    It's common for 3rd parties to work with a limited number of vendors - GlobalDots and its multi-vendor approach is different. Thanks to GlobalDots vendors umbrella, the hybrid-cloud migration was exceedingly smooth

    Motti Shpirer
    Motti Shpirer

    VP of Infrastructure & Technology

    Advertising Services