CLOUDBLEED: WHAT WE KNOW AND WHAT YOU SHOULD DO
If Shakespeare were alive today (and blogging), he might have written about the latest vulnerability to sweep the Internet by pointing out:
Hath not the cloud interfaces, code, logic, data? Accessed with the same protocols, exploited with the same weapons, subject to the same vulnerabilities, mitigated by the same solutions, patched by the same methods as other software? If you exploit it, does it not bleed?