Страницы

Sunday, December 20, 2020

О взломах

"On Dec. 14, 2020, SolarWinds announced it has evidence that the vulnerability was inserted in its Orion monitoring products and existed in updates released between March and June 2020. On Dec. 15, 2020, Reuters reported that (1) security researcher Vinoth Kumar alerted SolarWinds last year that anyone could access the company's update server by using the password "solarwinds123," and (2) Kyle Hanslovan, co-founder of cybersecurity company Huntress, noticed that even days after SolarWinds knew their software was compromised the malicious updates were still available for download." Пароль, конечно, лучше, чем 12345. но ... Отсюда

No comments:

Post a Comment