![]() ![]() ![]() “We are continuing to thoroughly investigate the origin and extent of this incident,” the company said. Sumo Logic, which was taken private earlier this year after being acquired by private equity firm Francisco Partners for $1.7 billion, says it has more than 2,100 customers, including 23andMe, Okta and Samsung. The company says users should immediately rotate their API access keys and should also reset Sumo Logic-installed collector credentials, third-party credentials that have been stored with Sumo, such as credentials for S3 access and user passwords for Sumo Logic accounts. Sumo Logic says there is no indication that the company’s networks or systems have been impacted and said customer data “has been and remains encrypted.” However, the company is advising customers to “rotate credentials that are either used to access Sumo Logic or that you have provided to Sumo Logic to access other systems.” The company did not immediately respond to TechCrunch’s questions. After discovering the incident, Sumo Logic says it locked down the exposed infrastructure and rotated every potentially exposed credential for their infrastructure “out of an abundance of caution.” The incident involved an attacker using compromised credentials to access a Sumo Logic AWS account. In a security notice published this week, Sumo Logic confirmed it had discovered evidence of a potential security incident on November 3. Sumo Logic, a U.S.-based cloud data analytics and log analysis company, is urging users to reset API keys after discovering a security breach. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |