Toggle light / dark theme

The widespread and monthslong hack of the U.S. government and some of America’s biggest corporations was enabled by an unlikely source: a little-known Austin, Texas, software company called SolarWinds Corp. that until this week was a household name only to computer network administrators.

Security investigators say the company that boasts more than 400 of the Fortune 500 corporations and many government agencies as clients provided the perfect delivery mechanism for a carefully executed intrusion attributed to Russia’s foreign-intelligence service.


SolarWinds provides the tools many companies use to manage their computer networks. That’s what made the hack of U.S. government agencies and some of America’s biggest corporations so pernicious.

The US government has confirmed that a massive hack had occurred in at least two federal departments, including the US Treasury and the Department of Commerce.


Hackers were able to monitor internal emails at US federal departments, including the Treasury, for months. There is concern officials have only scratched the surface of understanding the hack’s effects.

Best bug tracking software tools and systems: track defects efficiently with these top tools.

We are testers – in other words, bug finders. Defect/Bug/Issue/Fault/Failure/Incident – whatever we choose to call – our primary job description revolves around finding, recording, reporting, managing and tracking these. There is no harm in using an excel sheet to record/track and emails to report/alert/communicate.

Circa 2015


At the Association for Computing Machinery’s Programming Language Design and Implementation conference this month, MIT researchers presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications.

Remarkably, the system, dubbed CodePhage, doesn’t require access to the source code of the applications whose functionality it’s borrowing. Instead, it analyzes the applications’ execution and characterizes the types of security checks they perform. As a consequence, it can import checks from applications written in programming languages other than the one in which the program it’s repairing was written.

Once it’s imported code into a vulnerable application, CodePhage can provide a further layer of analysis that guarantees that the bug has been repaired.

Hackers with possible links to Iran appear to have breached an unprotected human-machine interface system at an Israeli water reservoir that connected directly to the internet and lacked security protocols, according to industrial cybersecurity firm Otorio.

See Also: Live Webinar | Securing Mobile Endpoints to Protect IP in the Pharma Industry

The security firm reports that the alleged Iranian hacking group, referred to as “Unidentified TEAM,” published a video of the attack on an unnamed reclaimed Israeli water reservoir human-machine interface (HMI) system, which did not require any authentication to access and modify the system. This allowed the threat actors to tamper with the water pressure, change temperatures and more.