Remove solarwinds-hackers-accessed-microsoft-source-code
article thumbnail

Microsoft Signing Key Stolen by Chinese

Schneier on Security

The hackers used forged authentication tokens to access user email, using a stolen Microsoft Azure account consumer signing key. The fact that Microsoft has not been forthcoming about the details of what happened tell me that the details are really bad. I believe this all traces back to SolarWinds.

article thumbnail

Latest on the SVR’s SolarWinds Hack

Schneier on Security

The New York Times has an in-depth article on the latest information about the SolarWinds hack (not a great name, since it’s much more far-reaching than that). “This tells us the actor had access to SolarWinds’ environment much earlier than this year. We know at minimum they had access Oct.

Hacking 323
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 295

Security Affairs

Every week the best security articles from Security Affairs free for you in your email box.

article thumbnail

10 Top Active Directory Security Tools for 2022

eSecurity Planet

Microsoft’s identity and access management tools dominate the enterprise market, with more than a 50% market share between Active Directory (AD) for Windows and Azure servers. And that makes Active Directory a frequent target for hackers. Identity management plays a critical role in every IT security strategy.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

This article looks at the top VCs in cybersecurity, a selection of investments, and considerations for entrepreneurs trying to develop an idea or scale a business. Read more : How Hackers Use Reconnaissance – and How to Protect Against It. Investments in cybersecurity more than doubled from $12 billion to $29.5 Table of Contents.