Media coverage

Here Are the Critical Responses Required of All Businesses After SolarWinds Supply-Chain Hack

Sorry, this post has not been published yet, check again later!

December 15, 2020
Published by:

SC Magazine

SolarWinds estimates that between last March and June, roughly 18,000 user organizations downloaded updates of its Orion software that Russian APT actors allegedly corrupted with Sunburst backdoor malware. John Mancini, senior product manager at Vectra, said that a core point of the DHS’ guidance for remediating the SolarWinds hack is to analyze for any listed indicators of compromise and then “identify potential behaviors in metadata that may be related to the compromise.”

Read publication

Most recent media coverage

What could the Biden presidency mean for cybersecurity?

January 21, 2021


Read more

Researchers Find New Form of Malware Used in the SolarWinds Attack

January 20, 2021

Silicon Angle

Read more

#Inauguration2021: Cyber-Experts React as Joe Biden Set to Become 46th US President

January 20, 2021


Read more