![]() ![]() ![]() I have been working with SolarWinds products since 2005 and built up and maintained an extensive SolarWinds Orion implementation from 2011 to 2017. The issue was reported to them Novemand was remediated on November 22, 2019. Over and over I read and hear their stupid password "Solarwinds123". I am not saying SolarWinds is without blame. If you have any questions that I can help with, please reply here. I have seen a lot of wild speculation and guessing about the SolarWinds supply chain compromise. Stamos helped Zoom.now teamed up with Chris Krebs their first client is SolarWinds. Hacking victim SolarWinds hires ex-Homeland Security official Krebs as consultant This is a great analysis of how the code was injected into the Software pipeline. SUNSPOT Malware: A Technical Analysis | CrowdStrike SolarWinds releases updated advisory for new SUPERNOVA malwareĬ - Emergency Directive 21-01 SolarWinds compromise exploited through sophistication and patienceĪnalyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers - Microsoft Security Here are some important links for information and background on the hack of Solarwinds. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |