Stay updated with breaking news from Wind ramakrishna. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.
advertisement advertisement The SolarWinds cyberattack on U.S. government agencies and private organizations was and is frightening in its scale and success. It proved no match for the government agencies charged with defending against such things, and brought into sharp focus the fact that the government’s current model for responding to cyberthreats is lacking. advertisement advertisement The Senate Intelligence Committee hosted some of the main players in the SolarWinds saga Tuesday for some soul-searching on how the government and private tech companies should work together to stop future attacks. Some of the main themes discussed in the hearing are likely to end up in new cybersecurity legislation this year, a Congressional source told me. ....
SolarWinds, Microsoft, FireEye, CrowdStrike executives face U.S. Senate grilling netscape.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from netscape.com Daily Mail and Mail on Sunday newspapers.
SolarWinds, Microsoft, FireEye, CrowdStrike executives face U.S. Senate grilling reuters.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from reuters.com Daily Mail and Mail on Sunday newspapers.
Get Permission Microsoft s security team says the company s Office 365 suite of products did not serve as an initial entry point for the hackers who waged the SolarWinds supply chain attack. And SolarWinds CEO, in a new blog, says the company has not identified a specific vulnerability in Office 365 that would have allowed the threat actor to enter our environment. The incident, he says, involved the compromise of an email account through the theft of credentials. Microsoft also points to credential theft. In our investigations to date, data hosted in Microsoft services - including email - was sometimes a target in the [SolarWinds-related] incidents, but the attacker had gained privileged credentials in some other way, according to Microsoft s security team, which published a blog Thursday. ....
Get Permission Investigators probing the supply chain attack that hit SolarWinds say attackers successfully hacked the company s Microsoft Visual Studio development tools to add a backdoor into software builds. The backdoor, dubbed Sunburst, was added to the company s Orion network monitoring software beginning in March 2020. Up to 18,000 customers installed and ran the Trojanized software. Attackers then used the backdoor to target a subset of customers, perhaps numbering in the hundreds, for second-stage attacks, which could have led to data exfiltration, eavesdropping - including email inbox access - and follow-on attacks against business partners. SolarWinds CEO Sudhakar Ramakrishna On Monday, Austin, Texas-based SolarWinds released an update on its attack investigation, reporting that investigators have successfully reverse-engineered code that attackers injected into its software development tools. ....