More on that Solorigate threat actor, especially its non-SolarWinds activity. Chimeras new target list. Executive Order on reducing IaaS exploitation. The case of the stolen laptop.

Published: Jan. 20, 2021, 8:12 p.m.

Another security company discloses a brush with the threat actor behind Solorigate. Advice on hardening Microsoft 365 against that same threat actor. Chimera turns out to be interested in airlines as well as semiconductor manufacturing intellectual property. Former President Trump\u2019s last Executive Order addresses foreign exploitation of Infrastructure-as-a-Service products. Joe Carrigan looks at a hardware key vulnerability. Our guest is Chris Eng from Veracode with insights from their State of Software Security report. And investigation of that\xa0laptop stolen from the Capitol continues.\nFor links to all of today's stories check out our CyberWire daily news brief:\nhttps://www.thecyberwire.com/newsletters/daily-briefing/10/12\nLearn more about your ad choices. Visit megaphone.fm/adchoices