Skip to content
Silicon Shecky

Silicon Shecky

Infosec Practitioner

  • New Year, New Post, from the start General
  • First Defcon – The results Reviews
  • Defender, KQL and Lockbit Microsoft
  • Do well, not be “popular” Ramblings
  • Defense Layers: A Case Study Microsoft
  • Device vs. User Microsoft
  • Ransomware, Are You Ready? General
  • Gatekeeping and Treatment of Others Rants

Solarwinds Sunbursts a Supernova: Early lessons learned

Posted on December 22, 2020 By Michael Kavka No Comments on Solarwinds Sunbursts a Supernova: Early lessons learned

There will be more fallout from Solarwinds to come. More companies will realize they are compromised due to either SUNBURST or SUPERNOVA (got to love the catchy, similar style names).

The question is what are you and your company going to do about it? What have you and your company learned?

Do not just throw money at this. Vendors will start trying to use this as a marketing ploy, especially to those that do in house development. If you do in house development, work on getting your Secure Development Lifecycle (SDLC) better. Do not over promise and over push your developers. If developers say they need some extra time for security testing, understand it will save you more issues in the long run. Understand that meeting compliance check boxes will not mean that security was met.

The rest of the corporate world should be doing a few things starting with your people and processes. Make sure that your company has in place a solid detection process, which includes enough staff, proper logging, solid SIEM/SOAR rules and notebooks, and a solid Incident Response plan. If your company is lacking in any of these, and that includes keeping people trained, it will be money well spent in the long term. Your company will get breached at some point and these processes plus properly trained people will always be needed. There is no perfect security, so detection is as important if not more important.

Understand there is no magic bullet. Security is a process not a destination, and burned out, overworked security people (especially in the SOC) do your company no good. Compensating by getting more and more tools without enough staff will cause burnout. People can only do so much in any given time. Make sure they get time off, and that means not disturbing them when they are off, if possible.

These are the lessons every company should learn from this situation.

 

 

Rants, Security Tags:Security, Solarwinds, Sunburst, Supernova

Post navigation

Previous Post: The One About Chained Exploits and Pentest Results
Next Post: Solarwinds Sunburst: Haven’t We Been Here Before?

Related Posts

  • Defender, KQL and Lockbit Microsoft
  • Do well, not be “popular” Ramblings
  • Defense Layers: A Case Study Microsoft
  • Device vs. User Microsoft
  • Ransomware, Are You Ready? General
  • Gatekeeping and Treatment of Others Rants

More Related Articles

Defender, KQL and Lockbit Microsoft
Do well, not be “popular” Ramblings
Defense Layers: A Case Study Microsoft
Device vs. User Microsoft
Ransomware, Are You Ready? General
Gatekeeping and Treatment of Others Rants

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • About
  • Links
    • Burbsec
    • BSides312
    • Infosec Exchange Mastodon
    • BSidesRoc
    • Hacks4Pancakes Blog
    • Krebs On Security
    • Bleeping Computer
  • Categories
    • General
    • Computers
    • Software
    • Rants
    • Security
    • Internet/Music
    • Reviews
    • Microsoft
    • Hardware
    • Mobile Computing
  • Archives
  • Social Media

Browse by tags

Active Directory Android Antivirus Apple Beta Chrome Computers Exchange Exchange 2007 Firefox General Thoughts Google InfoSec Internet Explorer iOS iPad IT Linux Mac Malware Microsoft OS OSx Patches Rants SBS SBS 2008 Security Security Patches Server SMB Software Support Surface TechEd Tweets Ubuntu Verizon Virus Vista vulnerabilities Windows Windows 7 Windows 8 XP

RSS Taggart Institute Intel Feed

  • Device code phishing attacks surge 37x as new kits spread online April 4, 2026 Bill Toulas
  • Gambling Is Thousands of Years Older Than We Thought, Rewriting Human Evolution April 4, 2026 Becky Ferreira
  • Trump wants to take a battle axe to CISA again and slash $707M from budget April 3, 2026 Jessica Lyons
  • When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications April 3, 2026 Jay Chen and Royce Lu
  • Friday Squid Blogging: Jurassic Fish Chokes on Squid April 3, 2026 Bruce Schneier
  • LinkedIn secretely scans for 6,000+ Chrome extensions, collects data April 3, 2026 Lawrence Abrams
  • LinkedIn secretly scans for 6,000+ Chrome extensions, collects data April 3, 2026 Lawrence Abrams
  • OpenClaw gives users yet another reason to be freaked out about security April 3, 2026 Dan Goodin
  • FCC proposes $4.5 million fine for voice service provider hosting ‘suspicious’ foreign call traffic April 3, 2026
  • CISA gives agencies two weeks to patch video conferencing bug exploited by Chinese hackers April 3, 2026
  • DomainTools Investigations | DPRK Malware Modularity: Diversity and Functional Specialization April 3, 2026
  • EU cyber agency attributes major data breach to TeamPCP hacking group April 3, 2026
  • New Year, New Post, from the start General
  • First Defcon – The results Reviews
  • Defender, KQL and Lockbit Microsoft
  • Do well, not be “popular” Ramblings
  • Defense Layers: A Case Study Microsoft
  • Device vs. User Microsoft
  • Ransomware, Are You Ready? General
  • Gatekeeping and Treatment of Others Rants

Social Media

  • Bluesky
  • Mastodon
  • Twitter

Copyright © 2026 Silicon Shecky.