2020年美国联邦政府数据泄露事件 (Chinese Wikipedia)

Analysis of information sources in references of the Wikipedia article "2020年美国联邦政府数据泄露事件" in Chinese language version.

refsWebsite
Global rank Chinese rank
1st place
1st place
49th place
81st place
7th place
31st place
99th place
225th place
786th place
827th place
3,700th place
4,616th place
12th place
60th place
low place
low place
388th place
546th place
79th place
143rd place
117th place
166th place
476th place
1,277th place
6,171st place
5,964th place
20th place
41st place
low place
low place
low place
low place
259th place
738th place
low place
low place
114th place
276th place
36th place
153rd place
220th place
426th place
193rd place
421st place
28th place
71st place
low place
low place
34th place
129th place
137th place
538th place
129th place
436th place
140th place
399th place
312th place
1,093rd place
low place
low place
431st place
1,112th place
269th place
623rd place
61st place
145th place
low place
low place
474th place
1,083rd place
4,767th place
4,063rd place
low place
low place
599th place
1,908th place
30th place
111th place
low place
low place
2,523rd place
3,383rd place
8th place
32nd place
5th place
12th place
low place
low place
low place
low place
1,303rd place
1,372nd place
8,888th place
6,251st place
low place
low place
8,991st place
5,638th place
low place
low place
low place
low place
1,716th place
3,372nd place
7,969th place
5,601st place
519th place
1,496th place
low place
low place
571st place
1,229th place
low place
low place
389th place
464th place
low place
low place
204th place
124th place
22nd place
110th place
low place
low place
low place
low place
1,943rd place
2,036th place
low place
low place
low place
low place
4,244th place
7,469th place
5,670th place
low place
low place
low place
7,835th place
9,391st place
4,756th place
6,473rd place
54th place
88th place
7,049th place
low place
low place
low place
2,429th place
4,071st place
1,521st place
1,712th place
383rd place
336th place
low place
low place
752nd place
2,156th place
92nd place
352nd place
472nd place
1,296th place
41st place
182nd place
low place
low place
115th place
346th place
low place
low place
low place
low place
low place
low place

abc11.com

abc57.com

apnews.com

arstechnica.com

axios.com

bankinfosecurity.com

bbc.co.uk

bbc.com

bgr.com

  • Here's why it's so dangerous that SolarWinds hackers accessed Microsoft's source code. BGR. 2021-01-01 [2021-01-13]. (原始内容存档于2021-02-26). More than two weeks after the hacks, Microsoft disclosed that the attackers were able to access a critical piece of software, the source code from one or more undisclosed products. Microsoft explained in a blog post that the hackers were not able to modify the source code. But even just a glance at a source code from a company like Microsoft might be enough for hackers to develop new attacks that compromise other Microsoft products. ... Microsoft’s blog post is meant to reassure governments and customers, but the fact remains that hackers might be in possession of the kind of secrets they shouldn’t have access to. Time will tell if gaining access to Microsoft’s source code will allow the same team of attackers to create even more sophisticated hacks. 

bleepingcomputer.com

bloomberg.com

bloomberglaw.com

news.bloomberglaw.com

businessinsider.com

c4isrnet.com

cbc.ca

chinaembassy.org.sg

chron.com

ciphercloud.com

cisa.gov

cisa.gov

us-cert.cisa.gov

cloudflare.com

blog.cloudflare.com

cnbc.com

cnn.com

cnn.com

edition.cnn.com

computerworld.com

  • Bradley, Susan. SolarWinds, Solorigate, and what it means for Windows updates. Computerworld. 2021-01-04 [2021-01-13]. (原始内容存档于2021-03-22). Microsoft investigated further and found that while the attackers were not able to inject themselves into Microsoft’s ADFS/SAML infrastructure, 'one account had been used to view source code in a number of source code repositories. The account did not have permissions to modify any code or engineering systems and our investigation further confirmed no changes were made.' This is not the first time Microsoft’s source code has been attacked or leaked to the web. In 2004, 30,000 files from Windows NT to Windows 2000 leaked onto the web via a third party. Windows XP reportedly leaked online last year. 

cpomagazine.com

  • Software Giant Admits That SolarWinds Hackers Viewed Microsoft Source Code. CPO Magazine. 2021-01-07 [2021-01-13]. (原始内容存档于2021-01-26). Microsoft disclosed [that] the hacking group behind the SolarWinds attack also viewed Microsoft source code for unnamed products. ... Microsoft, however, downplayed the breach, saying that the security of its products does not depend on the secrecy of its source code. Contrarily, Microsoft source code for most high-profile products remains to be among the most jealously guarded corporate secrets, shared only with a few trusted customers and governments. 

cyber.gc.ca

cyberscoop.com

deepinstinct.com

defensesystems.com

dhs.gov

dhs.gov

  • Leadership. Department of Homeland Security. September 7, 2006 [December 17, 2020]. (原始内容存档于December 16, 2020). 

cyber.dhs.gov

domaintools.com

dw.com

esquire.com

fireeye.com

forbes.com

forensicnews.net

github.com

gizmodo.com

ico.org.uk

independent.co.uk

itwire.com

japantimes.co.jp

justsecurity.org

krebsonsecurity.com

latimes.com

malwarebytes.com

blog.malwarebytes.com

marketwatch.com

miamiherald.com

msn.com

nbcnews.com

newsweek.com

npr.org

nytimes.com

politico.com

pri.org

reuters.com

reuters.com

uk.reuters.com

schneier.com

scmagazine.com

seattletimes.com

securityweek.com

sky.com

news.sky.com

slashgear.com

slate.com

talkingpointsmemo.com

technologyreview.com

techradar.com

  • Spadafora, Anthony. Mimecast may also have been a victim of the SolarWinds hack campaign. TechRadar. 2021-01-12 [2021-01-13]. (原始内容存档于2021-01-13). The reason that Mimecast may have been attacked by the same threat actor behind the SolarWinds hack is due to the fact that these hackers often add authentication tokens and credentials to Microsoft Active Directory domain accounts in order to maintain persistence on a network and to achieve privilege escalation. 

techtimes.com

telegraph.co.uk

thedispatch.com

theguardian.com

thehill.com

theintercept.com

theregister.com

theverge.com

threatpost.com

time.com

timesofisrael.com

trendmicro.com

trustedsec.com

usatoday.com

volexity.com

washingtonpost.com

wbrz.com

web.archive.org

wired.com

worldcat.org

wsj.com

zdnet.com