Obsidian Security Raises $90M Series C To Cement Its Key Role In SaaS Security crowdfundinsider.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from crowdfundinsider.com Daily Mail and Mail on Sunday newspapers.
Jan. 12, 2021 10:59 pm ET
A breach at email security provider Mimecast Inc. underscores that Russia-linked hackers appear to have targeted victims along multiple avenues of attack in what is shaping up to be one of the most successful cyber campaigns of U.S. government and corporate systems.
The attack potentially adds thousands of victims to the yearslong intelligence operation and likely aimed at gaining access to email systems, security experts say. Mimecast, in a Tuesday blog post, said the hackers were able to obtain a digital certificate used by the company to access its customersâ Microsoft 365 office productivity services.
The Mimecast hackers used tools and techniques that link them to the hackers who broke into Austin, Texas-based SolarWinds Corp., according to people familiar with the investigation. The link to the SolarWinds hackers was reported earlier by Reuters.
As Understanding of Russian Hacking Grows, So Does Alarm
Those behind the widespread intrusion into government and corporate networks exploited seams in U.S. defenses and gave away nothing to American monitoring of their systems.
Legal prohibitions on the National Security Agency bar it from surveilling networks inside the United States.Credit.T.J. Kirkpatrick for The New York Times
Published Jan. 2, 2021Updated Jan. 5, 2021
On Election Day, General Paul M. Nakasone, the nation’s top cyberwarrior, reported that the battle against Russian interference in the presidential campaign had posted major successes and exposed the other side’s online weapons, tools and tradecraft.
Russians Are Believed to Have Used Microsoft Resellers in Cyberattacks
Evidence from the security firm CrowdStrike suggests that companies that sell software on behalf of Microsoft were used to break into Microsoft’s Office 365 customers.
New evidence suggests that the SolarWinds hackers used companies that sell software on behalf of Microsoft as a conduit to break into customers’ software.Credit.Sergio Flores/Reuters
Dec. 24, 2020
As the United States comes to grips with a far-reaching Russian cyberattack on federal agencies, private corporations and the nation’s infrastructure, new evidence has emerged that the hackers hunted their victims through multiple channels.
The most significant intrusions discovered so far piggybacked on software from SolarWinds, the Austin-based company whose updates the Russians compromised. But new evidence from the security firm CrowdStrike suggests that companies that sell software on Microsoft’s behalf were also used to break into custom