SolarWinds Attack Gives Rise to New Runtime Security Models

Overview

A group that calls itself “Cozy Bear” gained access to government and private companies, including top security product firms, using a compromised update to SolarWinds' Orion software. This attack was so large it was deemed a “Grave Risk to Cyber Security.” 

Analyzing the attack, there are three important highlights worth diving into a little deeper:

Avoiding Vulnerabilities in Software Development

With data breaches on the rise, creating and maintaining secure software is vital to every organization. Although not all attacks can be anticipated or prevented, many can be avoided by eliminating vulnerabilities in software. In this article, you’ll learn about some of the most common software vulnerabilities and how to avoid these issues. You’ll also learn some general best practices for ensuring that your software and data remain secure.

Addressing Common Software Vulnerabilities 

The vulnerabilities below are just a few of those identified in MITRE’s 2019 CWE Top 25 Most Dangerous Software Errors list. Many of these issues continue to be included in software despite being widely known and used by attackers.