What can we help you with?

The first stage of the attack occurred as a result of login information for SolarWinds’ update server being left on a public GitHub repository, which allowed attackers to gain access and upload files to the company’s servers, “This was discovered in November 2019 and responsibly reported to SolarWinds by a security researcher. However, it’s believed that the credentials had been published to the repository as early as June 2018. SolarWinds corrected the situation within a few days but the damage was done. This is not a unique scenario, it happens far more frequently than it should,” said Brian Chappell, chief security strategist, EMEA & APAC, BeyondTrust.

Read the full story here: https://www.itp.net/security/s...