Hacker News new | past | comments | ask | show | jobs | submit login
Deep dive into the Solorigate second-stage activation (microsoft.com)
2 points by sz4kerto on Jan 21, 2021 | hide | past | favorite | 1 comment



Something I find concerning about sophisticated attacks like this is the asymmetric time expenditure it places on the victims and investigators.

It'll be tricky to push back attackers (as a trend) if they're able to consume defenders' time resources.

That makes me wonder what are useful avenues for defenders to explore in order to reduce defence time cost.

Much of it, I think, will come down to the ability to simplify and reduce the size of systems and software infrastructure without impeding business operations.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: