Remove blogs solarwinds
article thumbnail

Decrypted: With more SolarWinds fallout, Biden picks his cybersecurity team

TechCrunch

In this week’s Decrypted, we look at the ongoing fallout from the SolarWinds breach and who the incoming president wants to lead the path to recovery. Google says SolarWinds exposure “limited,” more breaches confirmed. It was the same attackers as SolarWinds but using a different intrusion route.

Company 290
article thumbnail

Solorigate: SolarWinds Orion Platform Contained a Backdoor Since March 2020 (SUNBURST)

Tenable

According to a tweet from Dustin Volz, reporter for The Wall Street Journal, the source of the breach was "a flaw in IT firm SolarWinds.". They got in through a flaw in IT firm SolarWinds, which has 100s of thousands of customers, including military and Fortune 500. I have report from Microsoft about SolarWinds hack, including IoCs.

Security 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Researchers Find New Chunk of SolarWinds Attackers’ infrastructure

CTOvision

Read Dennis Fisher explain how RiskIQ security researchers have found the majority of command and control servers used by the SolarWinds hackers on Duo Security Blog : Months after the initial revelation of the intrusion at SolarWinds, researchers have discovered that the footprint of the infrastructure used by the attackers is much larger than previously (..)

Research 101
article thumbnail

CVE-2021-35211: SolarWinds Serv-U Managed File Transfer Zero-Day Vulnerability Exploited in Targeted Attacks

Tenable

Following a patch for a zero-day vulnerability in SolarWinds’ Serv-U Managed File Transfer, researchers share new details about the attacks, as over 8,000 systems remain publicly accessible and potentially vulnerable. CVE-2021-35211 is a memory escape vulnerability in SolarWinds Serv-U Managed File Transfer Server. Background.

article thumbnail

Dissecting the SolarWinds hack without the use of signatures

Darktrace

This blog explains how activity related to the SolarWinds hack can be detected without the use of signatures, and why a self-learning approach is the best possible mechanism to catch this Advanced Persistent Threat.

133
133
article thumbnail

Synopsys and ESG report points to prevalence of software supply chain risks

Synopsys

New research shows organizations are significantly increasing efforts to secure their supply chains in response to software supply chain attacks like Log4Shell, SolarWinds, and Kaseya. The post Synopsys and ESG report points to prevalence of software supply chain risks appeared first on Application Security Blog.

Report 83
article thumbnail

Detect SolarWinds Orion breach

TechTalk

As mentioned in the previous post about GFI LanGuard as an alternative patch solution to SolarWinds Orion, this follow-up provides details about how GFI LanGuard can be used to locate devices and detect the SolarWinds Orion product versions which were exploited in the breach.

69