SolarWinds Articles
2024-01-19
Microsoft ‘senior leadership’ emails accessed by Russian SolarWinds hackers. And by password stuffing.Previous notes have been moved to here
Updated 2024-01-20 05:49z with 3239 articles
Index by topic
- Articles in chronological order of publication
- Articles in chronological order of discovery
- Articles by website, searchable
- Duration of attack, recovery
- Hearings request details about hack
- New policies consideration
- Timeline of the attack
- First vector of attack
- Best journalism regarding the attack
- SEC Investigation
- SolarWinds Stock and associated legal action
- Legal action or legislation
- White House Executive order
- Remote code execution
- Drilldown: Detailed, low-level analysis of malware and TTP
- Attackers still have access to compromised servers
- Malware used in the attack
- Tools Techniques and Procedures in the attack
- Credentials involved in hack including SAML
- Indicators of Compromise
- Detecting the presence of the attack
- Active Persistent Threat
- The vector or vectors used in the attack
- Phishing
- DNS extraction or circumvention
- Cloud vector involvement
- Tools for detection and recovery
- Protection processes
- Vulnerabilities
- How to remove the malware
- Monitoring
- How to prevent attacks
- Zero trust
- Dept of Homeland Security hackers
- Mimecast
- Identifications of the victims of the attack
- Microsoft agent breached
- Failure to detect
- Loss of information such as source code
- Information breached or infrastructure compromised
- Description of the attack
- Cost of recovery
- Extent of attack and recovery effort
- Duration of attack, recovery
- Impact of hack
- International implicaitons
- Legisltation considered
- Legislslation would establish cybersecurity training
- Investment in security
- Funding for remediation and prevention
- 60 day sprints announced
- Breach disclosure requirements
- Reactions to the attack
- Actions responding to attack
- Congressional Hearings
- Board reform to include security
- Sharing information about hacks
- Considerations of Surveillance
- Transparency regarding hack
- Insurance
- Discrete actions taken in response to the attack
- Retaliation
- response
- Government breach or response
- Leadership
- The intern did it
- Pointing fingers
- Rejoinder to vendor's claims
- Vendor relevance to hack
- Culture
- Supply Chain Risk Warning
- Software Bill of Materials and SLSA
- Reproduceable builds or parallel builds
- Recovery from attack
- History of attacks
- Analysis of the attack
- Investigation of the vector
- Remediation
- Strategy for overall remediaton and long term view
- Attribution of the attacking actor
- Mostly Marketing
- Alternatives to SolarWinds
- Video or Audio story
- astronomy