• Verticals
    • Healthcare and BioSciences
    • Financial
    • Legal/Law Firms
    • Municipalities and Small Governments
  • News & Resources
    • Cyreonix Blog
    • California Consumer Privacy Act 2018
    • General Data Protection Regulation (EU)
    • Webinars
  • Strategic Partners
  • Advanced Cyber Defenses
  • Managing Risk and Compliance
  • Education & Training
  • Information Center

Call Us Today 888-223-5722

consulting@techsafe.systems
techsafe.systemstechsafe.systems
techsafe.systemstechsafe.systems
  • Verticals
    • Healthcare and BioSciences
    • Financial
    • Legal/Law Firms
    • Municipalities and Small Governments
  • News & Resources
    • Cyreonix Blog
    • California Consumer Privacy Act 2018
    • General Data Protection Regulation (EU)
    • Webinars
  • Strategic Partners
  • Advanced Cyber Defenses
  • Managing Risk and Compliance
  • Education & Training
  • Information Center
SolarWinds and FireEye customers under threat, as Microsoft announces it was effected as well!

SolarWinds and FireEye customers under threat, as Microsoft announces it was effected as well!

To Our Customers, Prospects, Partners, and the Cybersecurity Community:

 On Sunday, Dec 13, it was reported that SolarWinds was the subject of a sophisticated supply chain attack targeting SolarWinds Orion Platform software, their enterprise IT monitoring solution. According to public and private sources, this supply chain attack is linked to FireEye and other US federal entities being targeted.

In the released Indicators of Compromise (IOCs) associated with both the FireEye and SolarWinds breaches, Cyreonix Fortify/SentinelOne customers are protected. In the SolarWinds attack, dubbed “SUNBURST,” SentinelLabs research has confirmed that devices with  Cyreonix Fortify/SentinelOne agents deployed are specifically exempt from the malicious payload used in the reported IOCs. As presented in the SolarWinds attack, SUNBURST does not trigger malicious activities on devices protected with  Cyreonix Fortify/SentinelOne.

Following the SolarWinds supply chain attack:

  1. SentinelOne’s Singularity Cloud blocks all reported IOCs
  2. All  Cyreonix Fortify/SentinelOne customers have access to a new hunting pack which includes custom Deep Visibility hunting queries for the latest SUNBURST and FireEye breach IOCs

Our recommendation to customers and the community-at-large is to follow SolarWinds’ security advisory instructions. In addition, please incorporate best practice countermeasures including:

  • Resetting all credentials used by or stored in SolarWinds software
  • Resetting service account passwords if service accounts were used with SolarWinds software
  • Referencing FireEye’s SUNBURST countermeasures

The  Cyreonix Fortify/SentinelOne team stands ready to assist in these times of uncertainty. Ensuring you’re informed and protected is key to staying secure. Our experts are available to speak on these events and your cybersecurity readiness by contacting us here or 888.223.5722

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message
Call Now : 888-223-5722

Keep in touch

  • “Click to Contact Our Consultants”
  • 888-223-5722
  • consulting@cyreonix.com

Social Icons Widget

BUSINESS HOURS

Note: All Monitoring Services and Alerting is 24/7/365

Monday – Friday : 8:30AM – 6:30PM EST

Saturday: By Appointment or Available based on Incident Response services

Sunday: Available based on Incident Response services

 

© 2025 techsafe.systems

  • Verticals
    • Healthcare and BioSciences
    • Financial
    • Legal/Law Firms
    • Municipalities and Small Governments
  • News & Resources
    • Cyreonix Blog
    • California Consumer Privacy Act 2018
    • General Data Protection Regulation (EU)
    • Webinars
  • Strategic Partners
  • Advanced Cyber Defenses
  • Managing Risk and Compliance
  • Education & Training
  • Information Center