{"id":39635,"date":"2021-02-18T16:00:42","date_gmt":"2021-02-18T16:00:42","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92881"},"modified":"2021-02-18T16:00:42","modified_gmt":"2021-02-18T16:00:42","slug":"turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/","title":{"rendered":"Turning the page on Solorigate and opening the next chapter for the security community"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/MSC17_dataCenter_020-1024x682.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span data-contrast=\"auto\">The recent SolarWinds attack is a <\/span><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2020\/12\/17\/cyberattacks-cybersecurity-solarwinds-fireeye\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">moment of reckoning<\/span><\/a><span data-contrast=\"auto\">. Today, as we close our own internal investigation of the incident, we continue to see an urgent opportunity for defenders everywhere to unify and protect the world in a more concerted way. We also see an opportunity for every company to adopt a Zero Trust plan to help defend against future attacks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">The&nbsp;<\/span><span data-contrast=\"auto\">Microsoft Security Research Center<\/span><span data-contrast=\"auto\">&nbsp;(MSRC), which has shared learnings and guidance throughout the&nbsp;<\/span><a href=\"https:\/\/aka.ms\/solorigate\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Solorigate<\/span><\/a><span data-contrast=\"auto\">&nbsp;incident,&nbsp;<\/span><span data-contrast=\"auto\">confirmed&nbsp;<\/span><a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/02\/18\/microsoft-internal-solorigate-investigation-final-update\/\"><span data-contrast=\"none\">today<\/span><\/a><span data-contrast=\"auto\">&nbsp;that<\/span><span data-contrast=\"auto\">&nbsp;following the completion of our internal investigation we\u2019ve seen no evidence that Microsoft systems were used to attack others. There was also no evidence of access to our production services or customer data.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">However, a concerning aspect of this attack&nbsp;<\/span><span data-contrast=\"auto\">is that&nbsp;<\/span><span data-contrast=\"auto\">security companies were a clear target. Microsoft, given the expansive use of our productivity tools and <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/01\/27\/microsoft-surpasses-10-billion-in-security-business-revenue-more-than-40-percent-year-over-year-growth\/\" target=\"_blank\" rel=\"noopener noreferrer\">leadership in security<\/a>, of course was an early target.&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">But while&nbsp;<\/span><span data-contrast=\"auto\">this&nbsp;highly-sophisticated&nbsp;nation state actor was&nbsp;<\/span><span data-contrast=\"auto\">able to&nbsp;breach&nbsp;the gate, they were met by&nbsp;<\/span><span data-contrast=\"auto\">a&nbsp;<\/span><span data-contrast=\"auto\">unified team of human and digital defenders.&nbsp;<\/span><span data-contrast=\"auto\">There are several reasons why we were able to limit the scope and impact of this incident for our company, customers, and partners, but ultimately, they all boil down to a few fundamental ways we approach security.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">We believe these approaches represent an opportunity for all IT and security teams as we collectively navigate a rapidly evolving and sophisticated threat landscape<\/span><span data-contrast=\"auto\">.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<h2>Adopt a Zero Trust mindset<\/h2>\n<p><span data-contrast=\"auto\">A key action is<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">implementing a<\/span><span data-contrast=\"auto\">&nbsp;<\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Zero Trust architecture<\/span><\/a><span data-contrast=\"auto\">.&nbsp;<\/span><span data-contrast=\"auto\">In this approach, companies must<\/span><span data-contrast=\"auto\">&nbsp;assume all activity\u2014even by trusted users\u2014could be an attempt to breach systems, and everything&nbsp;<\/span><span data-contrast=\"auto\">a company does should be<\/span><span data-contrast=\"auto\">&nbsp;designed around that assumption.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">T<\/span><span data-contrast=\"auto\">o&nbsp;<\/span><span data-contrast=\"auto\">guard<\/span><span data-contrast=\"auto\">&nbsp;against&nbsp;<\/span><span data-contrast=\"auto\">these&nbsp;<\/span><span data-contrast=\"auto\">pervasive threat<\/span><span data-contrast=\"auto\">s,<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">it\u2019s recommended that organizations deploy<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">zero-trust architecture and defense-in-depth protections,&nbsp;<\/span><span data-contrast=\"auto\">installing&nbsp;<\/span><span data-contrast=\"auto\">defenses like a layer cake<\/span><span data-contrast=\"auto\">&nbsp;across<\/span><span data-contrast=\"auto\">&nbsp;code, coding tools, email, cloud apps, endpoints, identities,&nbsp;<\/span><span data-contrast=\"auto\">the<\/span><span data-contrast=\"auto\">&nbsp;developer community, defender products<\/span><span data-contrast=\"auto\">\u2014<\/span><span data-contrast=\"auto\">everything.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Zero Trust is a proactive mindset. When every employee at a company<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">assumes<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">attackers are<\/span><span data-contrast=\"auto\">&nbsp;going to land<\/span><span data-contrast=\"auto\">&nbsp;at some point, they model threats and implement mitigations to ensure<\/span><span data-contrast=\"auto\">&nbsp;that&nbsp;<\/span><span data-contrast=\"auto\">any potential exploit can\u2019t&nbsp;<\/span><span data-contrast=\"auto\">expand.&nbsp;<\/span><span data-contrast=\"auto\">The value of defense-in-depth is that security is built into key areas an actor might try to break, beginning at the code level and extending to all systems in an end-to-end way.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Customer Guidance<\/span><\/b><b><span data-contrast=\"auto\">:<\/span><\/b><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">As companies think about&nbsp;<\/span><span data-contrast=\"auto\">deploying a zero-trust<\/span><span data-contrast=\"auto\"> posture and making a transition from implicit trust to explicit verification, the first step to consider is protecting identities, especially privileged user accounts. Gaps in protecting identities (or user credentials), like weak passwords or lack of multifactor authentication, are opportunities for an actor to find their way into a system, elevate their status, and move laterally across the environments targeting email, source code, critical databases and more. <\/span><span data-contrast=\"auto\">We witnessed this in&nbsp;Solorigate&nbsp;when&nbsp;<\/span><span data-contrast=\"auto\">abandoned app accounts with no multi-factor authentication were used to access cloud administrative settings with high privilege.<\/span><span data-contrast=\"auto\">&nbsp;To explore protecting privileged identity and access, companies should review our post on&nbsp;<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/compass\/overview\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Securing privileged access overview | Microsoft Docs<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h2>Embrace the cloud<\/h2>\n<p><span data-contrast=\"auto\">We were also reminded of the importance of cloud technology over on-premises software. Cloud technologies like Microsoft 365, Azure, and the additional premium layers of services available as part of these solutions, improve a defender\u2019s ability to protect their own environment.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Baseline layers of protection are not enough for today\u2019s sophisticated threats. Defense strategies must match up to these increasingly sophisticated attacks while factoring in the complexities of securing a remote workforce. If you are not thinking about advanced layers of protection that can&nbsp;<\/span><span data-contrast=\"auto\">detect<\/span><span data-contrast=\"auto\">,&nbsp;<\/span><span data-contrast=\"auto\">aler<\/span><span data-contrast=\"auto\">t<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">prevent&nbsp;<\/span><span data-contrast=\"auto\">and respond to attacks across identities,&nbsp;<\/span><span data-contrast=\"auto\">email<\/span><span data-contrast=\"auto\">, cloud apps<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">&nbsp;and endpoints, you may be&nbsp;<\/span><span data-contrast=\"auto\">locking<\/span><span data-contrast=\"auto\">&nbsp;a door&nbsp;<\/span><span data-contrast=\"auto\">while<\/span><span data-contrast=\"auto\">&nbsp;leaving the window open.&nbsp;<\/span><span data-contrast=\"auto\">From Microsoft, consider technologies like&nbsp;<\/span><a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Azure Active Directory<\/span><\/a><span data-contrast=\"auto\">&nbsp;and&nbsp;<\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/security\/microsoft-365-defender\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Microsoft 365 Defender<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">One of t<\/span><span data-contrast=\"auto\">he most important&nbsp;<\/span><span data-contrast=\"auto\">pieces of guidance for any security posture that we can share right now&nbsp;<\/span><span data-contrast=\"auto\">is&nbsp;<\/span><span data-contrast=\"auto\">to&nbsp;<\/span><span data-contrast=\"auto\">layer up<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">&nbsp;no matter who&nbsp;<\/span><span data-contrast=\"auto\">your security vendors are<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">In addition, w<\/span><span data-contrast=\"auto\">ith the&nbsp;<\/span><span data-contrast=\"auto\">Microsoft cloud, customers benefit from&nbsp;<\/span><span data-contrast=\"auto\">industry-leading<\/span><span data-contrast=\"auto\"> threat intelligence, powerful AI, machine learning, and defense-in-depth capabilities<\/span><span data-contrast=\"auto\">&nbsp;that most companies simply could not develop on their own. Our platform and services&nbsp;<\/span><span data-contrast=\"auto\">assess<\/span><span data-contrast=\"auto\">&nbsp;over eight trillion security signals every&nbsp;<\/span><span data-contrast=\"auto\">day<\/span><span data-contrast=\"auto\">, enabling Microsoft to take more of the work off a defender\u2019s plate. Our technology can surface and correlate security alerts that could represent a larger issue or remediate issues on demand with our own threat experts. As an example, in 2020 over 30 billion email threats were blocked by&nbsp;<\/span><span data-contrast=\"auto\">Microsoft cloud technology<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Customer Guidance<\/span><\/b><b><span data-contrast=\"auto\">:<\/span><\/b><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">One of the things our customers should consider is managing identity and access from the cloud. When you rely on on-premises services, like&nbsp;authentication&nbsp;server, it is up to a customer to protect their identity infrastructure. With a cloud identity, like Azure A<\/span><span data-contrast=\"auto\">ctive&nbsp;<\/span><span data-contrast=\"auto\">D<\/span><span data-contrast=\"auto\">irectory<\/span><span data-contrast=\"auto\">, we protect the identity infrastructure from the cloud. Our cloud-scale machine learning systems reason over trillions of signals in real time. So, we can detect and remediate attacks that nobody else can see.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h2>Strengthen the community of defenders<\/h2>\n<p><span data-contrast=\"auto\">Finally, we know that we all have an important role to play in strengthening and empowering the defender community at large. It was great to see this sharing in action in December&nbsp;when&nbsp;<\/span><a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">FireEye<\/span><\/a><span data-contrast=\"auto\">&nbsp;first alerted the community of a \u201cglobal intrusion campaign.\u201d&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">At Microsoft,&nbsp;<\/span><span data-contrast=\"auto\">communicating and collaborating with our customers and partners<\/span><span data-contrast=\"auto\">&nbsp;is a top priority<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">&nbsp;Over t<\/span><span data-contrast=\"auto\">he past several weeks, security teams&nbsp;across&nbsp;Microsoft (<\/span><span data-contrast=\"auto\">Microsoft Threat Intelligence Center\/<\/span><a href=\"https:\/\/blogs.microsoft.com\/eupolicy\/2020\/01\/08\/cultivating-defense-against-cyberthreats\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">MSTIC<\/span><\/a><span data-contrast=\"auto\">,&nbsp;<\/span><span data-contrast=\"auto\">Microsoft Detection and Response Team\/<\/span><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/03\/25\/dart-the-microsoft-cybersecurity-team-we-hope-you-never-meet\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">DART<\/span><\/a><span data-contrast=\"auto\">,&nbsp;<\/span><span data-contrast=\"auto\">Microsoft Cyber Defense Operations Center\/<\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/cdoc\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">CDOC<\/span><\/a><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">and&nbsp;<\/span><span data-contrast=\"auto\">Microsoft Security Response Center\/<\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">MSRC<\/span><\/a><span data-contrast=\"auto\">)&nbsp;met&nbsp;daily<\/span><span data-contrast=\"auto\">&nbsp;and directly collaborated with customers and partners to share information and respond. W<\/span><span data-contrast=\"auto\">e shared the latest threat intelligence, indicators of compromise (IOC), published more than 15 blogs with technical guidance and best practice<\/span><span data-contrast=\"auto\">s,<\/span><span data-contrast=\"auto\">&nbsp;and notified customers of potentially related activity.&nbsp;<\/span><span data-contrast=\"auto\">We also offered security trials across our&nbsp;<\/span><span data-contrast=\"auto\">end-to-end product portfolio to give organizations the tools needed to combat this threat.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">This sharing is invaluable to the entire community.<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Customer Guidance<\/span><\/b><b><span data-contrast=\"auto\">:<\/span><\/b><b><span data-contrast=\"auto\">&nbsp;<\/span><\/b><span data-contrast=\"auto\">We encourage every company, of every size,&nbsp;<\/span><span data-contrast=\"auto\">to work with the community<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">to share information, strengthen defenses and respond to attacks.<\/span><span data-contrast=\"auto\">&nbsp;Join&nbsp;our<\/span><span data-contrast=\"auto\">&nbsp;<\/span><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-security-and\/ct-p\/MicrosoftSecurityandCompliance\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Microsoft Security and Compliance Tech Community<\/span><\/a><span data-contrast=\"auto\">&nbsp;to start or participate in a variety of community discussions.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Security is a journey of progress over perfection, and with these three approaches working in unison, we can all help to make the world&nbsp;more safe&nbsp;and secure.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/02\/18\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The recent SolarWinds attack is a moment of reckoning. Today, as we close our own internal investigation of the incident, we continue to see an urgent opportunity for defenders everywhere to unify and protect the world in a more concerted way. We also see an opportunity for every company to adopt a Zero Trust plan&#8230;<br \/>\nThe post Turning the page on Solorigate and opening the next chapter for the security community appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39636,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-39635","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Turning the page on Solorigate and opening the next chapter for the security community 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Turning the page on Solorigate and opening the next chapter for the security community 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-18T16:00:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"682\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Turning the page on Solorigate and opening the next chapter for the security community\",\"datePublished\":\"2021-02-18T16:00:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\\\/\"},\"wordCount\":1223,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\\\/\",\"name\":\"Turning the page on Solorigate and opening the next chapter for the security community 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community.jpg\",\"datePublished\":\"2021-02-18T16:00:42+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community.jpg\",\"width\":1024,\"height\":682},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Turning the page on Solorigate and opening the next chapter for the security community\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Turning the page on Solorigate and opening the next chapter for the security community 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/","og_locale":"en_US","og_type":"article","og_title":"Turning the page on Solorigate and opening the next chapter for the security community 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-02-18T16:00:42+00:00","og_image":[{"width":1024,"height":682,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Turning the page on Solorigate and opening the next chapter for the security community","datePublished":"2021-02-18T16:00:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/"},"wordCount":1223,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community.jpg","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/","url":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/","name":"Turning the page on Solorigate and opening the next chapter for the security community 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community.jpg","datePublished":"2021-02-18T16:00:42+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community.jpg","width":1024,"height":682},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/turning-the-page-on-solorigate-and-opening-the-next-chapter-for-the-security-community\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Turning the page on Solorigate and opening the next chapter for the security community"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39635"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39635\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39636"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}