NIST's guidance for a Zero Trust Architecture

Recent AD News

Hackers responsible for the SolarWinds hack also have their hands on Azure and Exchange source code

In an update released this Thursday, Microsoft disclosed that the hackers responsible for the SolarWinds attack have also stolen some source code related to Azure, Exchange, and Intune components. However, the tech giant added that their investigation did not point to any evidence of abuse targeted at their internal systems and its customers.

Microsoft took notice of this compromise back on December 31,2020, when they discovered evidence of unusual activity. They quickly uncovered that one of their accounts was used to view source code in some source code repositories. However since the account had restricted access to modify the source code, major ramifications have been prevented.

In the light of the SolarWinds breach, Microsoft has urged enterprises to adopt a zero-trust mentality – to bestow only the absolute necessary privilege and enforce multi-factor authentication.

Related posts
Recent AD News

Automate access decisions with risk-based contextual authentication

Recent AD News

2020 recorded the highest number of CVE’s to ever be reported

Recent AD News

Microsoft announces Azure Best Practices and Launches Conditional Access Enhancements

Recent AD News

Accellion Zero-Days Responsible for Recent Data Theft and Extortion Attacks

Leave a Reply

Your email address will not be published. Required fields are marked *