mappopla.blogg.se

Jetbrains solarwinds
Jetbrains solarwinds










  1. #JETBRAINS SOLARWINDS UPDATE#
  2. #JETBRAINS SOLARWINDS SOFTWARE#

None of the three stories, however, specified what was compromised or how. The Wall Street Journal took a little more caution, conceding that its sources weren't sure how SolarWinds' TeamCity server was accessed, while Reuters only added that the FBI was investigating the matter. Readers could easily be left with the impression that JetBrains was either compromised - much in the same manner as SolarWinds - or a party to the compromise.

#JETBRAINS SOLARWINDS SOFTWARE#

The New York Times promoted its story with the fact that JetBrains CEO was born in Russia, and that its operations are based in the Czech Republic, just as previous New York Times stories made much of SolarWinds employing software engineers in Central Europe. JetBrains acknowledges that SolarWinds is a TeamCity customer.

#JETBRAINS SOLARWINDS UPDATE#

It makes for a juicy target for attackers intent on modifying a software update in the final stages of the build process. Software developers use JetBrains, typically in combination with a version control system, to manage and automate the testing and compilation process. JetBrains' TeamCity is a build management and continuous integration server. The thinly sourced and somewhat confusing stories were published in New York Times and the Wall Street Journal and repeated by Reuters. Two of America's most respected mastheads allege that attackers were able to poison a SolarWinds software update in early 2020 via the company's use of JetBrains TeamCity. JetBrains stories generate heat, shed little light Your weekly dose of Seriously Risky Business news is written by Brett Winterford, edited by Patrick Gray and supported by the Cyber Initiative at the Hewlett Foundation.












Jetbrains solarwinds