Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
We do not use cookies of this type.
Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.
We do not use cookies of this type.
Analytics cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
We do not use cookies of this type.
Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.
We do not use cookies of this type.
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
We do not use cookies of this type.
”Cleaning up SolarWinds hack may cost as much as $100 billion Government agencies, private corporations will spend months and billions of dollars to root out the Russian malicious code.” Â Gopal Ratnam January 11, 2021.
Prior to SolarWinds‘ massive cyberattack, discovered, by chance, in December 2020, it was later proven that unlawful Access had been gained via a NOT SECURE subdomain and INSECURE DNS servers that enabled the launch of the world’s largest Cyberattack, to date.
The below NOT SECURE mx.solarwinds.com subdomain screenshot was captured within days of the attack being confirmed and the DNS INSECURE DNS servers pre-dated the announcement by 8 months.
Whitethorn Shield from Cybersec Innovation Partners was used to identify these exposed, vulnerable, and quite likely exploited Internet Assets which estimates suggest have exceeded $100 billion in costs and losses.
Whitethorn Shield PPV (Pay Per Vulnerability) was launched yesterday to enable companies to gain real-time visibility of their critical Internet Assets enabling proactive, pre incident prevention as opposed to post even forensic analysis.
Other solutions such as Patch Tuesday and PDNS are Post incident and therefore Reactive at best.