ASIMILY_INSIGHT retweetledi
ASIMILY_INSIGHT
106 posts

ASIMILY_INSIGHT
@ASIMILYINSIGHT
Enabling the Lifecycle Management and Security of Medical and Connected Devices in Healthcare
Sunnyvale, CA Katılım Şubat 2020
54 Takip Edilen9 Takipçiler
ASIMILY_INSIGHT retweetledi

No one mentioned it yet, so thought worth to do now: Ragnarok ransomware actors have a new leak site, named "RAGNAROK FILE LEAKED".
First entry was added on December 23...
@demonslay335 @VK_Intel

English
ASIMILY_INSIGHT retweetledi

After the global attack by the hackers, the FBI became interested in the company JetBrains ehackingnews.com/2021/01/after-…

English
ASIMILY_INSIGHT retweetledi

[Register now] Upcoming webcast hosted by HealthITSecurity "Developing a Secure Care Strategy" on January 25th at 3:00PM ET featuring Mitchell Parker, MBA, CISSP | Sponsored By: @DellTech #cybersecurity go.xtelligentmedia.com/2021-1-25DellW…

English
ASIMILY_INSIGHT retweetledi

A critical flaw in #WordPress plugin Orbit Fox could allow attackers to take control of vulnerable websites.
threatpost.com/orbit-fox-word…
English
ASIMILY_INSIGHT retweetledi

The Trump administration is doling out $8 million to improve broadband access for rural telehealth services. fiercehealthcare.com/tech/trump-adm…
English
ASIMILY_INSIGHT retweetledi

Ascension will divest seven hospitals, 21 physician clinics and a medical transport company in north and central Wisconsin. #healthcare ow.ly/U2Fn50D6NJA
English
ASIMILY_INSIGHT retweetledi

This guide is a collection of some of the most useful information & models for those working in a #SOC, as well as incredibly powerful free tools, book references & more to help build your team.
Download now: sans.org/u/19qy

English
ASIMILY_INSIGHT retweetledi

Discover why organizations that view capital allocation and operational execution as an integrated process drive increased value. bit.ly/2LtV7AZ
English
ASIMILY_INSIGHT retweetledi
ASIMILY_INSIGHT retweetledi

Alleged attackers behind the Solarwinds #Sunburst attack are apparently auctioning off the data stolen from various breaches.
Again alleged, but appears to be Microsoft/Cisco/Solarwinds source code, FireEye red team tools, etc. all up for auction.
solarleaks.net
English
ASIMILY_INSIGHT retweetledi

ASIMILY_INSIGHT retweetledi

🚨URGENT🚨 Our #IncidentResponse team has put together a playbook of recommended actions to provide some level of assurance that your organization is no longer affected by the SolarWinds backdoor #solarigate
hubs.la/H0CPz9r0
English
ASIMILY_INSIGHT retweetledi

Key revelation in the #SolarWindsHack advisory from @CISAgov:
"The SolarWinds Orion supply chain compromise is not the only initial infection vector this APT actor leveraged.”
Stay tuned for more revelations… This is worse than people think
us-cert.cisa.gov/ncas/alerts/aa…
English
ASIMILY_INSIGHT retweetledi

According to FireEye, attackers tampered with a #software update released by #SolarWinds, which eventually led to the compromise of numerous public and private organizations around the world with #SUNBURST backdoor.
thehackernews.com/2020/12/us-age…
#infosecurity

English
ASIMILY_INSIGHT retweetledi

Ok, this gives us a little more info. It was a DLL, as I suggested in a previous tweet, and it occurred in March.
Jerry Gamblin@JGamblin
Microsoft says that their earliest IOC for the Solarwind breach is March 2020.
English
ASIMILY_INSIGHT retweetledi

This continues to be an interesting development.
Looks like Solarwinds Orion was the original entry point from the FireEye breach including treasury and commerce.
Microsoft updated 21 hours ago with defender update with artifact detection .
microsoft.com/en-us/wdsi/thr…
Ellen Nakashima@nakashimae
UPDATE: Sources tell me that the victims--Treasury, Commerce, FireEye--were breached through an IT Management System called Solar Winds washingtonpost.com/national-secur…
English
ASIMILY_INSIGHT retweetledi




