Part of Akamai's incident management process for vulnerabilities in third party software involves verifying potential impact in other systems using the same or similar libraries.
Summary
The actors behind the SolarWinds attack have leveraged a well-known contact management email site in a phishing campaign. Several news outlets and Microsoft's Threat Intelligence Center have provided details on the campaign.
Threat Type
Malware, Phishing
Overview
According to several news outlets and Microsoft's Threat Intelligence Center (MSTIC), the actors behind the SolarWinds attack have struck again, this time leveraging Constant Contact in order to carry out a phishing and malware campaign. Th