<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SolarStorm attack - Share your thoughts in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/375836#M89230</link>
    <description>&lt;P&gt;I'm surprised more of these attacks haven't occurred or at least been detected.&amp;nbsp; Last year I went to an ICS security conference in Atlanta and sat through a briefing on this very topic.&amp;nbsp; A company Adolus had been working with the DHS under a SVIP project to develop protections in the ICS / IoT space against supply chain attacks.&amp;nbsp; It basically involves embedding some sort of visibility within a vendor directly monitoring suppliers directly within their core private networks.&amp;nbsp; Under this project there's an attempt to create a trust within the larger global supply chain ecosystem.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The brief really got me excited and hopeful that something like this could be used to prevent such attacks, but it only works if you have vendor involvement, or if the government mandates it.&amp;nbsp; There have been other successful supply chain attacks in the past (Rockwell / Dragonfly) nothing as large as Solarwinds, but there's still an obvious need to better protect our supply chain.&lt;/P&gt;</description>
    <pubDate>Tue, 22 Dec 2020 18:01:16 GMT</pubDate>
    <dc:creator>Brandon_Wertz</dc:creator>
    <dc:date>2020-12-22T18:01:16Z</dc:date>
    <item>
      <title>SolarStorm attack - Share your thoughts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/375319#M89166</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi everyone, we know there is a lot of news about the SolarWinds supply chain attack (SolarStorm Attack), and we want to let you know that we are here to help and want to make sure you have all the resources and information you need.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;We put together a blog sharing all the different ways Palo Alto Networks can help you navigate during this time.&amp;nbsp;&lt;/SPAN&gt;Learn about the upcoming Linkedin Live series&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;where Palo Alto Networks leaders and industry experts will be talking about how to assess your exposure in the wake of the SolarStorm attack. We guide you through &lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/navigating-the-solarstorm-attack-we-are-here-to-help/ba-p/375318" target="_blank" rel="noopener"&gt;all of the information here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 20:53:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/375319#M89166</guid>
      <dc:creator>agalindo</dc:creator>
      <dc:date>2021-01-05T20:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: SolarStorm attack - Share your thoughts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/375836#M89230</link>
      <description>&lt;P&gt;I'm surprised more of these attacks haven't occurred or at least been detected.&amp;nbsp; Last year I went to an ICS security conference in Atlanta and sat through a briefing on this very topic.&amp;nbsp; A company Adolus had been working with the DHS under a SVIP project to develop protections in the ICS / IoT space against supply chain attacks.&amp;nbsp; It basically involves embedding some sort of visibility within a vendor directly monitoring suppliers directly within their core private networks.&amp;nbsp; Under this project there's an attempt to create a trust within the larger global supply chain ecosystem.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The brief really got me excited and hopeful that something like this could be used to prevent such attacks, but it only works if you have vendor involvement, or if the government mandates it.&amp;nbsp; There have been other successful supply chain attacks in the past (Rockwell / Dragonfly) nothing as large as Solarwinds, but there's still an obvious need to better protect our supply chain.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2020 18:01:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/375836#M89230</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2020-12-22T18:01:16Z</dc:date>
    </item>
    <item>
      <title>Re: SolarStorm attack - Share your thoughts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/376077#M89255</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi everyone! Wanted to let you all know there are some upcoming webinars that Unit 42 is hosting around the SolarStorm Attack! Ryan &lt;/SPAN&gt;&lt;SPAN&gt;Olson, VP of Threat Intelligence here at Palo Alto Networks, will share some countermeasures you can take today to help protect your organization. He will also cover information about the Palo Alto Networks Response program and how it can help your organization assess and remediate risks related to SolarWinds. Find all upcoming webinars and registration information &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/navigating-the-solarstorm-attack-we-are-here-to-help/ba-p/375318" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;here&lt;/SPAN&gt;&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Dec 2020 18:51:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/376077#M89255</guid>
      <dc:creator>agalindo</dc:creator>
      <dc:date>2020-12-23T18:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: SolarStorm attack - Share your thoughts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/376091#M89256</link>
      <description>&lt;P&gt;I heard that even PAN got hacked as well because it is using Solarwinds in its environment.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Dec 2020 19:08:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/376091#M89256</guid>
      <dc:creator>dtran</dc:creator>
      <dc:date>2020-12-23T19:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: SolarStorm attack - Share your thoughts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/376136#M89267</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41973"&gt;@dtran&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;I heard that even PAN got hacked as well because it is using Solarwinds in its environment.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Well considering "&lt;SPAN&gt;...including more than 425 of the companies listed on the Fortune 500 as well as the top 10 telecom operators in the United States." it wouldn't surprise me if Palo Alto might have been running the affected software.&amp;nbsp; Further just because a company might have been running Orion doesn't mean they had deployed the vulnerable software versions.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That listing of 425 companies was more likely just a listing of "customers" and not necessarily customers running affected software versions.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Dec 2020 16:48:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/376136#M89267</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2020-12-24T16:48:28Z</dc:date>
    </item>
    <item>
      <title>Re: SolarStorm attack - Share your thoughts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/376764#M89328</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41973"&gt;@dtran&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;I heard that even PAN got hacked as well because it is using Solarwinds in its environment.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41973"&gt;@dtran&lt;/a&gt;&amp;nbsp;, If you read what Nikesh wrote here:&amp;nbsp;&lt;A href="https://blog.paloaltonetworks.com/2020/12/solarwinds-statement-solarstorm/" target="_blank"&gt;https://blog.paloaltonetworks.com/2020/12/solarwinds-statement-solarstorm/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;There was an attempt, but it was stopped with Palo Alto Networks Cortex XDR.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2020 17:13:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/376764#M89328</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2020-12-30T17:13:28Z</dc:date>
    </item>
    <item>
      <title>Re: SolarStorm attack - Share your thoughts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/381239#M89733</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello everyone! Just wanted to come on here and provide a quick update regarding the Unit 42 SolarStorm webinar briefings that were held last month. We recognize that some of you may not have been able to attend, so we want to share the on-demand link, which can be found &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/navigating-the-solarstorm-attack-we-are-here-to-help/ba-p/375318" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;here.&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 16:07:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/381239#M89733</guid>
      <dc:creator>agalindo</dc:creator>
      <dc:date>2021-01-21T16:07:39Z</dc:date>
    </item>
    <item>
      <title>Re: SolarStorm attack - Share your thoughts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/387070#M90334</link>
      <description>&lt;BLOCKQUOTE&gt;@&lt;A href="https://www.facetimeapp.ltd/facetime-for-pc-windows-download/" target="_self"&gt;&lt;SPAN&gt;FaceTime PC&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;SPAN&gt;Hi everyone, we know there is a lot of news about the SolarWinds supply chain attack (SolarStorm Attack), and we want to let you know that we are here to help and want to make sure you have all the resources and information you need.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We put together a blog sharing all the different ways Palo Alto Networks can help you navigate during this time.&amp;nbsp;Learn about the upcoming Linkedin Live series&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;where Palo Alto Networks leaders and industry experts will be talking about how to assess your exposure in the wake of the SolarStorm attack. We guide you through &lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/navigating-the-solarstorm-attack-we-are-here-to-help/ba-p/375318" target="_blank" rel="noopener"&gt;all of the information here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;The brief truly got me energized and cheerful that something like this could be utilized to forestall such assaults, yet it possibly works in the event that you have merchant contribution, or if the public authority orders it. There have been other fruitful inventory network assaults before (Rockwell/Dragonfly) nothing as extensive as Solarwinds, however there's as yet an undeniable need to more readily ensure our store network.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Feb 2021 07:03:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/solarstorm-attack-share-your-thoughts/m-p/387070#M90334</guid>
      <dc:creator>Martin312</dc:creator>
      <dc:date>2021-02-22T07:03:03Z</dc:date>
    </item>
  </channel>
</rss>

