Microsoft has released its current findings into the SolarWinds attack that continues to shake the global cybersecurity industry. So far, the technology firm has been able to outline attack methods, malware strains, and mitigation strategies but continues to stress that the full extent of the cyb...
Get More on DDoS Protection & Mitigation Do you find yourself asking… How does a DDoS attack work? What is the difference between a DDoS attack and a DoS attack? What are the types of DDoS attacks? Why is DDoS detection important? What do DDoS detection tools do? How to prevent DDoS ...
The time it takes between when an attacker is able to gain access and the time an attack is actually discovered is often referred to as dwell time. According to a report released in January 2020 by security firm CrowdStrike, theaverage dwell timein 2019 was 95 days. Given that it took we...
Calling the SolarWinds supply chain attack a "moment of reckoning," Microsoft in January recommended organizations to adopt a "zero trust mentality" in order to achieve the least privileged access and minimize risks by enabling multi-factor authentication. The company said the attacks have reinforced...
SolarWinds and our customers were the victims of a cyberattack to our systems that inserted a vulnerability (SUNBURST) within our Orion® Platform software builds for versions 2019.4 HF 5, 2020.2 unpatched, and 2020.2 HF 1, which, if present and activated, could potentially allow an attacker ...
The infamous threat group responsible for the SolarWinds supply chain attack are back at it with a new backdoor in its arsenal. Researchers with the Microsoft Threat Intelligence Center believe the Nobelium crew is using a piece of remote access malware dubbed "FoggyWeb" to maintain per...
Code Issues Pull requests Aggregation of threat intel sources for the SolarWinds Orion(SUNBURST) attack. solarwinds sunburst threat-intelligence unc2452 solorigate Updated Dec 28, 2020 alexkross / swipam-script Star 5 Code Issues Pull requests Ansible dynamic inventory script for SolarWinds IPA...
David A. Wheeler, the Linux Foundation's Director of Open Source Supply Chain Security, explained that in the Orion attack that the malicious code was inserted into Orion by subverting the program's build environment. This is the process in which a program is compiled from source code to the...
MORE ON CYBERSECURITY Cybersecurity: How to get your software patching strategy right and keep the hackers at bay Most applications today are deployed with vulnerabilities, and many are never patched These software bugs are years old. But businesses still aren't patching them ...
Understanding the SolarWinds Attack and Application Privileges No vendor can legitimately claim that their solution would have outright prevented the attack on SolarWinds, and we should be wary of any such claims. With that said, organizations can take strategic steps to prevent this type of a...