About this site
Home
Contact
About
Security projects
links
Services
Blog
SolarWinds Articles
Previous work
Work History
Projects
Past projects
Updated 2024-06-14 21:38z 3292 articles
Index by category
Articles in chronological order of discovery
Articles in chronological order of publication
Articles by website, searchable
Explain hack
Timeline of the attack
New policies consideration
Hearings request details about hack
Duration of attack, recovery
Initial vector
First vector of attack
Best articles
Best journalism regarding the attack
Legal action
Legal action or legislation
SolarWinds Stock and associated legal action
SEC Investigation
Executive Order
White House Executive order
Technical details
Vulnerabilities
Protection processes
Tools for detection and recovery
Cloud vector involvement
DNS extraction or circumvention
Phishing
The vector or vectors used in the attack
Active Persistent Threat
Detecting the presence of the attack
Indicators of Compromise
Credentials involved in hack including SAML
Tools Techniques and Procedures in the attack
Malware used in the attack
Attackers still have access to compromised servers
Drilldown: Detailed, low-level analysis of malware and TTP
Remote code execution
Removal
How to remove the malware
Prevention
Zero trust
How to prevent attacks
Monitoring
victims
Identifications of the victims of the attack
Mimecast
Dept of Homeland Security hackers
breach
Description of the attack
Information breached or infrastructure compromised
Loss of information such as source code
Failure to detect
Microsoft agent breached
Extent of attack
Impact of hack
Duration of attack, recovery
Extent of attack and recovery effort
Cost of recovery
Leadership, business issues and response
Leadership
Government breach or response
response
Retaliation
Discrete actions taken in response to the attack
Insurance
Transparency regarding hack
Considerations of Surveillance
Sharing information about hacks
Board reform to include security
Congressional Hearings
Actions responding to attack
Reactions to the attack
Breach disclosure requirements
60 day sprints announced
Funding for remediation and prevention
Investment in security
Legislslation would establish cybersecurity training
Legisltation considered
International implicaitons
Who is to blame
Vendor relevance to hack
Rejoinder to vendor's claims
Pointing fingers
The intern did it
Cultural aspects that lead to breaches
Culture
Analysis of the attack and its impact and remediation
Attribution of the attacking actor
Strategy for overall remediaton and long term view
Remediation
Investigation of the vector
Analysis of the attack
History of attacks
Recovery from attack
Reproduceable builds or parallel builds
Software Bill of Materials and SLSA
Supply Chain Risk Warning
Marketing and alternatives
Alternatives to SolarWinds
Mostly Marketing
Podcast
Video or Audio story
Entertainment
astronomy