Tuesday, 20 June 2023
Estimated reading time:3 minutes
As the SolarWinds hack continues to unfold and expand in both its scope and impact, we know that the real jigsaw picture is much bigger than the pieces we currently know about. And as we still try and complete the SolarWinds jigsaw puzzle, the question that stares at us is, “What did we learn to be better prepared for the inevitable next time?”
SUNBURST was neither the first such hack, nor last. Let’s explore the learnings here, and start with the common elements of such events:
It is extremely important for an organization to enable prevention, segmentation, and zero trust authorizations for assets, users and data to implement a “shift left” security posture. But as we learnt above, these are necessary but not sufficient for modern attacks and hence an ‘Active Defense based Detect and Respond’ security posture that operationalizes deception as well as anomaly and kill-chain detections on pervasive visibility by algorithms, hunting and investigating are the only few opportunities to detect such a hack in early stages.
To summarize: to prepare for the next storm, create security operations processes that are founded on sound cyber-hygiene, prevention, segmentation, zero-trust as well as deception, visibility, threat hunting, investigation and response enabled by an Active XDR suite like Fidelis Elevate.
3 min read
A well-known law firm in New York has been attacked by a group of hackers using the REvil ransomware. The hacker group demanded a ransom of 42 million...
6 min read
Learn about Darkside's attack methods and how Picus stops it.
4 min read
Flowmon is a tool that enables the perfect synergy between NetOps and SecOps, helping businesses and organizations achieve the desired benefits.