The initial news of the SolarWinds supply chain attack was a devastating revelation to many organizations. It didn’t take the cybercriminal world long to try to profit off of this...
The initial news of the SolarWinds supply chain attack was a devastating revelation to many organizations. It didn’t take the cybercriminal world long to try to profit off of this breach with a new site dubbed “SolarLeaks” going up which claims to have data dumps – including source code – from some major companies, including Microsoft, Cisco, FireEye, and SolarWinds.
Click to watch Kilian Englert and Ryan O’Boyle from the Varonis Incident Response team as they analyze this developing story, and discuss why the inclusion of source code in the dumps is notable.
Additional Resources
Further reading on SolarLeaks: https://www.bleepingcomputer.com/news…
Varonis customers also get access to great educational content to help support them on their journey: https://www.varonis.com/how-to-videos/
Share this blog post with someone you know who'd enjoy reading it. Share it with them via email,LinkedIn,Reddit, or Facebook.
Kilian EnglertKilian has a background in enterprise security engineering, as well as security solution selling. Kilian is a Certified Information Systems Security Professional (CISSP) and creates internal and public content on topics related to cybersecurity and technology best practices.
Try Varonis free.
Get a detailed data risk report based on your company’s data. Deploys in minutes.
Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.
Threat Update #25 - HelloRansomware: A Look at the CD Projekt Red Attack
Kilian Englert
February 11, 2021
Love hacking in Cyberpunk? So do we! What about in real life? Not so much! Join Kilian Englert and Ryan O’Boyle from the Varonis Incident Response team as they discuss...
Threat Update 23 - Bypassing Endpoint Controls Using Office Macros
Kilian Englert
February 1, 2021
So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls! Don’t believe us? Check out this...
Threat Update 28 – Re-Ryuk’ed & Exchange Zero-Day
Kilian Englert
March 4, 2021
Is it too soon for a 2020 throwback? The Ryuk ransomware gang certainly doesn’t think so! It looks like one of the premiere ransomware-as-a-service groups was not content to rest on their laurels, and it appears they’ve added self-spreading capabilities.
Threat Update 27 – Concentrations of Power
Kilian Englert
February 25, 2021
Why are there certain account types that are often targeted by attackers? Why can it be really difficult to detect certain types of account misuse? What are some of the biggest AD hygiene issues we run into?