{"id":39646,"date":"2021-02-19T13:32:31","date_gmt":"2021-02-19T13:32:31","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32038\/Microsoft-Wraps-SolarWinds-Probe-Nudges-Companies-Towards-Zero-Trust.html"},"modified":"2021-02-19T13:32:31","modified_gmt":"2021-02-19T13:32:31","slug":"microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/","title":{"rendered":"Microsoft Wraps SolarWinds Probe, Nudges Companies Towards Zero Trust"},"content":{"rendered":"<div class=\"wysiwyg\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"852\" height=\"511\" src=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/CDOC-1024x511-1-e1605843829700.png\" alt class=\"wp-image-109892\" srcset=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/CDOC-1024x511-1-e1605843829700.png 852w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/CDOC-1024x511-1-e1605843829700-300x180.png 300w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/CDOC-1024x511-1-e1605843829700-768x461.png 768w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/CDOC-1024x511-1-e1605843829700-156x94.png 156w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/CDOC-1024x511-1-e1605843829700-312x187.png 312w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/11\/CDOC-1024x511-1-e1605843829700-640x384.png 640w\" sizes=\"auto, (max-width: 852px) 100vw, 852px\"><figcaption>Microsoft closed the book on the SolarWinds investigation. (Microsoft)<\/figcaption><\/figure>\n<p>Following an internal investigation, Microsoft, despite being an early target in the SolarWinds campaign, said none of its systems were used to attack others \u2013 a fact the company attributed to its zero trust mindset.<\/p>\n<p>The probe also found no evidence of access to Microsoft\u2019s production services or customer data, according to a blog <a href=\"https:\/\/www.microsoft.com\/security\/blog\/?p=92881\" target=\"_blank\" rel=\"noreferrer noopener\">post<\/a> penned by Vasu Jakkal, Microsoft corporate vice president of security, compliance and identity. <\/p>\n<p>The findings offer lessons for all companies on the benefits of the zero trust model, she added, saying that a transition from implicit trust to explicit verification requires \u201cprotecting identities, especially privileged user accounts.\u201d Such an approach will prevent hackers from taking advantage of gaps, like weak passwords or lack of multifactor authentication, \u201cto find their way into a system, elevate their status, and move laterally across the environments targeting email, source code, critical databases and more.\u201d <\/p>\n<p>That\u2019s what attackers did in what Microsoft refers to as <a href=\"https:\/\/aka.ms\/solorigate\" target=\"_blank\" rel=\"noreferrer noopener\">Solorigate<\/a>, using abandoned app accounts with no multi-factor authentication to access cloud administrative settings with high privilege.<\/p>\n<p>Vectra Chief Technology Officer Oliver Tavakoli applauded Microsoft\u2019s endorsement of a zero trust architecture. <\/p>\n<p>\u201cMicrosoft points out that organizations should go one step further by adopting it as a mindset \u2013 accept that all of the initial lines of defense can fail and that security controls need to be layered across all systems critical to an organization,\u201d he said.<\/p>\n<p>But Brandon Hoffman, chief information security officer at Netenrich, questioned the connection, noting that \u201cfrom a certain perspective, it\u2019s not clear that taking a zero trust stance would have prevented this issue.\u201d Although, it potentially would have avoided some of the damage, he explained, \u201cit\u2019s not clear that zero trust would have prevented the initial attack vector.\u201d<\/p>\n<p>Indeed, advocating for a zero trust plan at first blush seems prudent, \u201cbut is misleading here,\u201d since the incident \u201cisn\u2019t about a user who should not be trusted, it is about the sourcing itself,\u201d said Dirk Schrader, global vice president at New Net Technologies. \u201cAnd for this scenario, the user and the IT administration will be overwhelmed at end. At some stage, trust needs to be established to be operational, and with thousands of changes incurred to files and settings when rolling out a Microsoft patch day update, the IT administration would certainly not want to check each and every change.\u201d<\/p>\n<p>Jakkal also used the blog to announce Microsoft\u2019s decision to close the book on the investigation, a decision that is also receiving mixed reviews among researchers. Greenlight President Kevin Dunne said it \u201cmarks the first step in the process of the security community recovering from the Solorigate attack.\u201d <\/p>\n<p>\u201cMore time to investigate who is accessing critical infrastructure, applications, and data will result in reduced time to detecting and remediating breaches, which are inevitable in today\u2019s zero trust world,\u201d he added.<\/p>\n<p>Most productive would be \u201cto divert our combined energies from anatomizing the last attack, to preventing the next one,\u201d agreed Hitesh Sheth, CEO at Vectra. \u201cThe connected world will care little how we assign responsibility for SolarWinds if we do not collaborate on next-level threat detection to blunt the impact of future attacks.\u201d<\/p>\n<p>But Hoffman questions the decision, saying it conflicts with other messaging coming from Microsoft. Just Sunday, Microsoft president Brad Smith said in the news program \u201c60 Minutes\u201d that more than one thousand developers were likely involved in the code that enabled the attack, describing it as \u201cthe largest and most sophisticated attack the world has ever seen.\u201d<\/p>\n<p>\u201cAs the incident response has continued, it seems they were finding more and more areas affected by the SolarWinds issue,\u201d he said. \u201cThe fact that the investigation has concluded rather suddenly is an interesting move.\u201d<\/p>\n<\/p><\/div>\n<section class=\"post-tags\">\n<h2>Topics:<\/h2>\n<p> <a href=\"https:\/\/www.scmagazine.com\/tag\/cyberespionage\/\" class=\"button -secondary\">Cyberespionage<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/zero-trust\/\" class=\"button -secondary\">Zero Trust<\/a> <\/section>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32038\/Microsoft-Wraps-SolarWinds-Probe-Nudges-Companies-Towards-Zero-Trust.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39647,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9216],"class_list":["post-39646","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermicrosoftdata-lossbackdoor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Wraps SolarWinds Probe, Nudges Companies Towards Zero Trust 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Wraps SolarWinds Probe, Nudges Companies Towards Zero Trust 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-19T13:32:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust.png\" \/>\n\t<meta property=\"og:image:width\" content=\"852\" \/>\n\t<meta property=\"og:image:height\" content=\"511\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft Wraps SolarWinds Probe, Nudges Companies Towards Zero Trust\",\"datePublished\":\"2021-02-19T13:32:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\\\/\"},\"wordCount\":644,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust.png\",\"keywords\":[\"headline,hacker,microsoft,data loss,backdoor\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\\\/\",\"name\":\"Microsoft Wraps SolarWinds Probe, Nudges Companies Towards Zero Trust 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust.png\",\"datePublished\":\"2021-02-19T13:32:31+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust.png\",\"width\":852,\"height\":511},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,microsoft,data loss,backdoor\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermicrosoftdata-lossbackdoor\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Wraps SolarWinds Probe, Nudges Companies Towards Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Wraps SolarWinds Probe, Nudges Companies Towards Zero Trust 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Wraps SolarWinds Probe, Nudges Companies Towards Zero Trust 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-02-19T13:32:31+00:00","og_image":[{"width":852,"height":511,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft Wraps SolarWinds Probe, Nudges Companies Towards Zero Trust","datePublished":"2021-02-19T13:32:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/"},"wordCount":644,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust.png","keywords":["headline,hacker,microsoft,data loss,backdoor"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/","name":"Microsoft Wraps SolarWinds Probe, Nudges Companies Towards Zero Trust 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust.png","datePublished":"2021-02-19T13:32:31+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust.png","width":852,"height":511},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-wraps-solarwinds-probe-nudges-companies-towards-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,microsoft,data loss,backdoor","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermicrosoftdata-lossbackdoor\/"},{"@type":"ListItem","position":3,"name":"Microsoft Wraps SolarWinds Probe, Nudges Companies Towards Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39646"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39646\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39647"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}