{"id":9490,"date":"2024-06-11T07:54:52","date_gmt":"2024-06-11T05:54:52","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=9490"},"modified":"2024-06-12T16:20:53","modified_gmt":"2024-06-12T14:20:53","slug":"threat-intel-solarwinds-the-worlds-most-invasive-and-destructive-cyberattack-to-date","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/06\/11\/threat-intel-solarwinds-the-worlds-most-invasive-and-destructive-cyberattack-to-date\/","title":{"rendered":"THREAT INTEL: SOLARWINDS \u2013 The world\u2019s most invasive and destructive Cyberattack, to date."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9490\" class=\"elementor elementor-9490\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59833599 e-flex e-con-boxed e-con e-parent\" data-id=\"59833599\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58439cd2 elementor-widget elementor-widget-html\" data-id=\"58439cd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-659e03a7 e-con-full e-flex e-con e-parent\" data-id=\"659e03a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-63221859 e-con-full e-flex e-con e-child\" data-id=\"63221859\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-900545f elementor-widget elementor-widget-image\" data-id=\"900545f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/smartmockups_ltgx2hla-300x200.jpg\" class=\"attachment-medium size-medium wp-image-9075\" alt=\"Iain FRASER | Cybersecurity Journalist, Authority Writer &amp; Publisher CYBERInsights\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/smartmockups_ltgx2hla-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/smartmockups_ltgx2hla-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/smartmockups_ltgx2hla-768x511.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/elementor\/thumbs\/smartmockups_ltgx2hla-qoypuqj38vrt1cge5h0fveunnrqeixbgx7854flc8o.jpg 450w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/05\/smartmockups_ltgx2hla.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-181f8d9a elementor-widget elementor-widget-html\" data-id=\"181f8d9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2306a450 e-con-full e-flex e-con e-child\" data-id=\"2306a450\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-777db9f8 elementor-widget elementor-widget-wp-widget-text\" data-id=\"777db9f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p id=\"7444\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\">Gibraltar: Tuesday 11 June 2024 at 07:40 CET<\/p>\n<p id=\"6f37\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\"><strong class=\"ln fq\">THREAT INTEL: SOLARWINDS \u2014 The world\u2019s most invasive and destructive cyberattack, to date.<\/strong><\/p>\n<p id=\"54ee\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\">By Andy Jenkinson \u2014 Guest Contributor | Group CEO\u00a0<a class=\"af mj\" href=\"https:\/\/www.cybersecip.com\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">Cybersec Innovation Partners<\/a><br \/>\nvia\u00a0<a class=\"af mj\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">IainFRASER.net\/CYBERInsights<\/a><br \/>\n<a class=\"af mj\" href=\"https:\/\/www.google.com\/search?q=sme+cyber+insights&amp;oq=&amp;gs_lcrp=EgZjaHJvbWUqCQgAECMYJxjqAjIJCAAQIxgnGOoCMgkIARAjGCcY6gIyCQgCECMYJxjqAjIJCAMQIxgnGOoCMgkIBBAjGCcY6gIyCQgFECMYJxjqAjIJCAYQIxgnGOoCMgkIBxAjGCcY6gLSAQkxMDU1ajBqMTWoAgiwAgE&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener ugc nofollow\">SME Cyber Insights<\/a><\/p>\n<p data-selectable-paragraph=\"\"><a href=\"https:\/\/www.google.com\/search?q=SOLARWINDS+%E2%80%93+The+world%E2%80%99s+most+invasive+and+destructive+Cyberattack%2C+to+date.&amp;sca_esv=06fb960354387a84&amp;sca_upv=1&amp;sxsrf=ADLYWIJSZfOS-8npboTNP6NucvHzuYETaQ%3A1718201666453&amp;ei=Qq1pZqaYG5eS9u8P26ik4Ak&amp;ved=0ahUKEwimwez_n9aGAxUXif0HHVsUCZwQ4dUDCBA&amp;uact=5&amp;oq=SOLARWINDS+%E2%80%93+The+world%E2%80%99s+most+invasive+and+destructive+Cyberattack%2C+to+date.&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiUFNPTEFSV0lORFMg4oCTIFRoZSB3b3JsZOKAmXMgbW9zdCBpbnZhc2l2ZSBhbmQgZGVzdHJ1Y3RpdmUgQ3liZXJhdHRhY2ssIHRvIGRhdGUuSLISUABY7gRwAXgBkAEAmAGuAaABrgGqAQMwLjG4AQPIAQD4AQH4AQKYAgGgAh6oAhLCAgcQIxgnGOoCwgIHEC4YJxjqAsICFBAAGIAEGOMEGLQCGOkEGOoC2AEBmAMeugYGCAEQARgBkgcBMaAHgQM&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 110624 at 09:10 CET<\/a><\/p>\n<p id=\"01a0\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\"><em class=\"mk\">#SMECyberInsights #SMECybersecurityNews #Cybersecurity #WhitethornShield #InternetSecurity #Cybercrime #CyberInsurance #DNS #PKI<\/em><\/p>\n<p id=\"de33\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\"><strong class=\"ln fq\">THREAT INTEL: SOLARWINDS \u2014 The world\u2019s most invasive and destructive cyberattack, to date.<\/strong><\/p>\n<p id=\"9dbc\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\"><strong class=\"ln fq\">The day\u00a0<\/strong><a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><strong class=\"ln fq\">SolarWinds<\/strong><\/a><strong class=\"ln fq\">\u00a0finally listened and realized their massive security oversight -13 May 2021.<\/strong><\/p>\n<p id=\"dda9\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\"><strong class=\"ln fq\">The world\u2019s most invasive and destructive cyberattack, to date, was discovered by Fireye at\u00a0<\/strong><a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><strong class=\"ln fq\">SolarWinds<\/strong><\/a><strong class=\"ln fq\">\u00a0in December 2020.\u00a0<\/strong><a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><strong class=\"ln fq\">SolarWinds<\/strong><\/a><strong class=\"ln fq\">\u00a0had unknowingly suffered a subdomain takeover and a DNS attack. Both exploited\u00a0<\/strong><a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><strong class=\"ln fq\">SolarWinds<\/strong><\/a><strong class=\"ln fq\">\u2018 poor security of their critical Internet Assets.<\/strong><\/p>\n<p id=\"0dfc\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\">We reached out to\u00a0<a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/in\/tim-brown-ciso\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><em class=\"mk\">Tim Brown<\/em><\/a>,\u00a0<a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><strong class=\"ln fq\">SolarWinds<\/strong><\/a>\u00a0CISO and shared information of their exposure. Several months later many were addressed, albeit a tad late.<\/p>\n<p id=\"8eea\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\">The\u00a0<strong class=\"ln fq\">DNS<\/strong>\u00a0related attachments mean much more than is\u00a0<strong class=\"ln fq\">DNSSEC<\/strong>\u00a0used or not. They provide a comprehensive overview and identification of the\u00a0<strong class=\"ln fq\">DNS<\/strong>\u00a0and Servers in use:<\/p>\n<p id=\"4012\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\"><strong class=\"ln fq\">1) INSECURE DNS<\/strong>\u00a0records and Servers of\u00a0<a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">SolarWinds<\/a>\u00a0dated 13 May 2021<br \/>\n<strong class=\"ln fq\">2) SECURE DNS<\/strong>\u00a0records and Servers of\u00a0<a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">SolarWinds<\/a>\u00a0dated 14 May 2021<br \/>\n<strong class=\"ln fq\">3) SECURE<\/strong>\u00a0Named Servers of\u00a0<a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">SolarWinds<\/a>\u00a0dated 14 May 2021<br \/>\n<strong class=\"ln fq\">4) INSECURE<\/strong>\u00a0Named Servers of\u00a0<a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">SolarWinds<\/a>\u00a0dated 13 May 2021<\/p>\n<p id=\"34b2\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\">On the 13\/14 May 2021, 5 months after the discovery of the crippling, long term cyberattack,\u00a0<a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/in\/tim-brown-ciso\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><em class=\"mk\">Tim Brown<\/em><\/a><em class=\"mk\">\u00a0<\/em>and\u00a0<a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><strong class=\"ln fq\">SolarWinds<\/strong><\/a>\u00a0finally addressed these\u00a0<strong class=\"ln fq\">DNS<\/strong>\u00a0Named Servers.<\/p>\n<p id=\"19af\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\">The move from\u00a0<strong class=\"ln fq\">INSECURE DNS<\/strong>\u00a0Named Servers, to\u00a0<strong class=\"ln fq\">SECURE DNS<\/strong>\u00a0Named Servers marked a profound leap in resilience and security for\u00a0<a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><strong class=\"ln fq\">SolarWinds<\/strong><\/a><strong class=\"ln fq\">.<\/strong><\/p>\n<p id=\"272f\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\"><a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/in\/billatnapier\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><em class=\"mk\">Prof Bill Buchanan OBE FRSE<\/em><\/a>\u00a0wrote a paper on December 10 2015,\u00a0<em class=\"mk\">\u201dThe Most Fragile of Foundations of The Cyber Age \u2014 DNS\u201d<\/em><\/p>\n<p id=\"456a\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\">Companies that collect, collate, harvest, and use large amounts of data whilst lacking control and management of their\u00a0<strong class=\"ln fq\">DNS<\/strong>\u00a0are simply waiting and fueling\u00a0<strong class=\"ln fq\">Cybercrime.<\/strong><\/p>\n<p id=\"463b\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\"><strong class=\"ln fq\">The Will to Act, like ignorance, is a choice.<\/strong><\/p>\n<p id=\"56b9\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\">Sadly all too often poor choices on both fronts are made. When this occurs, companies and organizations remain exposed, vulnerable, and insecure. These companies greatly increase their chances to be added to the list of victims.<\/p>\n<p id=\"2968\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\">You can be Reactive to the Facts, as\u00a0<a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/in\/tim-brown-ciso\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><em class=\"mk\">Tim Brown<\/em><\/a>\u00a0and\u00a0<a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><strong class=\"ln fq\">SolarWinds<\/strong><\/a>\u00a0were, or Proactive and address these critical Internet Assets and\u00a0<strong class=\"ln fq\">DNS<\/strong>\u00a0servers.<\/p>\n<p id=\"c12f\" class=\"pw-post-body-paragraph ll lm fp ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fi bj\" data-selectable-paragraph=\"\"><a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/fbicyber\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><em class=\"mk\">FBI Cyber Division<\/em><\/a><em class=\"mk\">\u00a0<\/em><a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/fbi\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><em class=\"mk\">Federal Bureau of Investigation (FBI)<\/em><\/a><em class=\"mk\">\u00a0<\/em><a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/the-white-house\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><em class=\"mk\">The White House<\/em><\/a><em class=\"mk\">\u00a0<\/em><a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/gchq\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><em class=\"mk\">GCHQ<\/em><\/a><em class=\"mk\">\u00a0<\/em><a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/ncscc\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><em class=\"mk\">National Cybersecurity Coordination Center (NCSCC)<\/em><\/a><em class=\"mk\">\u00a0<\/em><a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/information-commissioner%27s-office\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><em class=\"mk\">Information Commissioner\u2019s Office<\/em><\/a><em class=\"mk\">\u00a0<\/em><a class=\"af mj\" href=\"https:\/\/www.linkedin.com\/company\/secgov\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><em class=\"mk\">U.S. Securities and Exchange Commission<\/em><\/a><\/p>\n<p><code><\/code><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffd23ab elementor-widget elementor-widget-image\" data-id=\"ffd23ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"407\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/SWAll-1024x651.png\" class=\"attachment-large size-large wp-image-9516\" alt=\"SolarWinds\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/SWAll-1024x651.png 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/SWAll-300x191.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/SWAll-768x488.png 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/SWAll-1536x976.png 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/SWAll.png 1774w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25c0a5d1 e-con-full e-flex e-con e-child\" data-id=\"25c0a5d1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a030b66 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1a030b66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55e7972a elementor-widget elementor-widget-wp-widget-text\" data-id=\"55e7972a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience<br \/>\nas a hands-on lateral thinking CEO, coach, and leader. A \u2018big deal\u2019 business accelerator, and<br \/>\ninspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering<br \/>\n100\u2019s \u00a3 millions of projects within the Cyber, Technical, Risk and Compliance markets for<br \/>\nsome of the world\u2019s largest, leading organisations. Andy has a demonstrable track record<br \/>\nof largescale technical delivery and management within many sectors including the<br \/>\nProfessional, Managed, and Financial Services.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28d26ee elementor-align-center elementor-widget elementor-widget-button\" data-id=\"28d26ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b596688 e-flex e-con-boxed e-con e-parent\" data-id=\"b596688\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: IfOnlyCommunications Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":9501,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[440],"tags":[439,515],"ppma_author":[505],"class_list":["post-9490","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","tag-cyberthreat-intel","tag-solarwinds"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_BlickPixel_Pixabay_ServerRoom2.jpg",1280,853,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_BlickPixel_Pixabay_ServerRoom2-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_BlickPixel_Pixabay_ServerRoom2-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_BlickPixel_Pixabay_ServerRoom2-768x512.jpg",640,427,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_BlickPixel_Pixabay_ServerRoom2-1024x682.jpg",640,426,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_BlickPixel_Pixabay_ServerRoom2.jpg",1280,853,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_BlickPixel_Pixabay_ServerRoom2.jpg",1280,853,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_BlickPixel_Pixabay_ServerRoom2-1024x682.jpg",1024,682,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_BlickPixel_Pixabay_ServerRoom2-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a>","tag_info":"SME CYBER\/THREAT INTEL","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/9490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=9490"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/9490\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/9501"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=9490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=9490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=9490"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=9490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}