Breach

January 20, 2021

SolarWinds attack opened up 4 separate paths to a Microsoft 365 cloud breach

Tactics expose the need for organizations to develop cohesive playbooks for breaches affecting hybrid environments.

The post SolarWinds attack opened up 4 separate paths to a Microsoft 365 cloud breach appeared first on SC Media.

January 19, 2021

Fourth SolarWinds malware strain shows diversity of tactics, need to focus on detection, response

Researchers have found a fourth strain of malware – Raindrop – that was used in the SolarWinds supply chain attack, a loader similar to the Teardrop tool. But while Teardrop was delivered by the original Sunburst backdoor in early July 2020, Raindrop was used just under two weeks later for spreading laterally across the victim’s…

The post Fourth SolarWinds malware strain shows diversity of tactics, need to focus on detection, response appeared first on SC Media.

January 13, 2021

Ubiquiti urges password reset, 2fa after breach

IoT networking device vendor Ubiquiti experienced a breach of a web portal it uses to manage remote devices and as a support portal. The web servers stored information pertaining to user profiles for the account.ui.com portal that Ubiquiti makes available to customers who bought one of its router or webcam products, a ZDNet report said.…

The post Ubiquiti urges password reset, 2fa after breach appeared first on SC Media.

January 11, 2021

Feds will weigh whether cyber best practices were followed when assessing HIPAA fines

Organizations that can show they did their due diligence in protecting medical information will be better off, should a breach occur.

The post Feds will weigh whether cyber best practices were followed when assessing HIPAA fines appeared first on SC Media.

January 11, 2021

SolarWinds hack is the perfect foreword to new book on history’s biggest breaches

SC Media spoke to author and former CISO Neil Daswani about his upcoming new book "Big Breaches: Cybersecurity Lessons for Everyone."

The post SolarWinds hack is the perfect foreword to new book on history’s biggest breaches appeared first on SC Media.

January 8, 2021

Legal recourse? Nissan balances competitive and security fallout from source code leak

News that source code of Nissan North America tools leaked online because of a misconfigured Git server spurs questions not only about potential cyberattacks by bad actors, but also whether competitors could use the sensitive data against the automobile giant.

The post Legal recourse? Nissan balances competitive and security fallout from source code leak appeared first on SC Media.

January 8, 2021

CISA discovers token abuse around SolarWinds hack, calls for full rebuild of affected networks

The agency has found evidence of authentication token abuse in networks infected with corrupted versions of Orion software and say restoring integrity will require a full network rebuild in certain cases.

The post CISA discovers token abuse around SolarWinds hack, calls for full rebuild of affected networks appeared first on SC Media.

January 7, 2021

The physical breach of the Capitol building opens a cybersecurity pandora’s box

The incident, as well as the response among those on Capitol Hill tasked with securing government technology assets, serves as a dramatic and evolving case study for public and private sector entities on the scope of the cybersecurity risk tied to a physical breach.

The post The physical breach of the Capitol building opens a cybersecurity pandora’s box appeared first on SC Media.

January 5, 2021

SolarWinds hack poses risk to cloud services’ API keys and IAM identities

The SolarWinds hack endangers not just organizations' on-premises systems but also their cloud-based infrastructure.

The post SolarWinds hack poses risk to cloud services’ API keys and IAM identities appeared first on SC Media.