Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • A new T-Mobile network for Christians aims to block porn and gender-related content
    • Affordable tiny house starts at just $30K and sleeps two
    • Atlassian’s revenue beat expectations – and its shares popped
    • Elon Musk Seemingly Admits xAI Has Used OpenAI’s Models to Train Its Own
    • OpenAI lawyers claim Shivon Zilis, a longtime Musk employee and mother to four of his children, acted as a covert liaison between him and OpenAI (Wired)
    • Huawei Unveils Car That Can Project Movies With Its Headlights
    • Dreame’s Nebula NEXT 01 JET electric hypercar specs
    • Startup 360: How to travel better and cheaper with AI
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Friday, May 1
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»How weak passwords and other failings led to catastrophic breach of Ascension
    News

    How weak passwords and other failings led to catastrophic breach of Ascension

    Editor Times FeaturedBy Editor Times FeaturedSeptember 22, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    Amid Ascension’s choice to not focus on the assault, there aren’t sufficient particulars to offer an entire post-mortem of Ascension’s missteps and the measures the corporate might have taken to stop the community breach. Usually, although, the one-two pivot signifies a failure to comply with varied well-established safety approaches. One in every of them is named safety in depth. The safety precept is much like the rationale submarines have layered measures to guard towards hull breaches and combating onboard fires. Within the occasion one fails, one other one will nonetheless include the hazard.

    The opposite uncared for strategy—generally known as zero belief—is, as WIRED explains, a “holistic strategy to minimizing harm” even when hack makes an attempt do succeed. Zero-trust designs are the direct inverse of the normal, perimeter-enforced hard on the outside, soft on the inside strategy to community safety. Zero belief assumes the community will likely be breached and builds the resiliency for it to face up to or include the compromise anyway.

    The flexibility of a single compromised Ascension-connected pc to convey down the well being big’s complete community in such a devastating method is the strongest indication but that the corporate failed its sufferers spectacularly. In the end, the community architects are accountable, however as Wyden has argued, Microsoft deserves blame, too, for failing to make the dangers and precautionary measures for Kerberoasting extra express.

    As safety skilled HD Moore noticed in an interview, if the Kerberoasting assault wasn’t out there to the ransomware hackers, “it appears seemingly that there have been dozens of different choices for an attacker (normal bloodhound-style lateral motion, digging by way of logon scripts and community shares, and so forth).” The purpose being: Simply because a goal shuts down one viable assault path is not any assure that others stay.

    All of that’s plain. It’s additionally indeniable that in 2025, there’s no excuse for a company as massive and delicate as Ascension struggling a Kerberoasting assault, and that each Ascension and Microsoft share blame for the breach.

    “Once I got here up with Kerberoasting in 2014, I by no means thought it will dwell for greater than a 12 months or two,” Medin wrote in a post revealed the identical day because the Wyden letter. “I (erroneously) thought that individuals would clear up the poor, dated credentials and transfer to safer encryption. Right here we’re 11 years later, and sadly it nonetheless works extra usually than it ought to.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    OpenAI lawyers claim Shivon Zilis, a longtime Musk employee and mother to four of his children, acted as a covert liaison between him and OpenAI (Wired)

    May 1, 2026

    Huawei expects AI chip revenue to hit ~$12B in 2026, up 60% from $7.5B in 2025, as orders for its Ascend 950PR chip surge and Nvidia stalls in China (Zijing Wu/Financial Times)

    May 1, 2026

    New York Launches Decade-Long Study on Gambling Addiction and Support Gaps

    May 1, 2026

    The most severe Linux threat to surface in years catches the world flat-footed

    April 30, 2026

    Meta says it might be forced to withdraw its apps from New Mexico if a judge orders it to adopt the state’s proposed safety features (Thomas Barrabi/New York Post)

    April 30, 2026

    when asked whether xAI has ever distilled tech from OpenAI, Elon Musk says the claim is “partly” true (New York Times)

    April 30, 2026

    Comments are closed.

    Editors Picks

    A new T-Mobile network for Christians aims to block porn and gender-related content

    May 1, 2026

    Affordable tiny house starts at just $30K and sleeps two

    May 1, 2026

    Atlassian’s revenue beat expectations – and its shares popped

    May 1, 2026

    Elon Musk Seemingly Admits xAI Has Used OpenAI’s Models to Train Its Own

    May 1, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    The who, what, and why of the attack that has shut down Stryker’s Windows network

    March 13, 2026

    Kikfin triple-thruster underwater jetpack with shark fins

    September 9, 2025

    Elon Musk Shared, Then Deleted X Post Absolving Hitler, Stalin and Mao of Genocide

    March 21, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.