Topics
Latest
AI
Amazon
Image Credits:Boris Zhitkov / Getty Images
Apps
Biotech & Health
clime
Image Credits:Boris Zhitkov / Getty Images
Cloud Computing
commercialism
Crypto
endeavour
EVs
Fintech
Fundraising
widget
Gaming
Government & Policy
ironware
layoff
Media & Entertainment
Meta
Microsoft
concealment
Robotics
Security
Social
quad
Startups
TikTok
transferral
Venture
More from TechCrunch
Events
Startup Battlefield
StrictlyVC
Podcasts
video
Partner Content
TechCrunch Brand Studio
Crunchboard
Contact Us
Sumo Logic , a U.S.-based cloud data analytics and log analytic thinking company , is urge on exploiter to reset API keystone after discover a protection breach .
In asecurity noticepublished this week , Sumo Logicconfirmed it had light upon evidence of a possible security incident on November 3 . The incident involved an attacker using compromised certification to get at a Sumo Logic AWS account . After discover the incident , Sumo Logic pronounce it locked down the exposed infrastructure and rotated every potentially exposed certification for their base “ out of an copiousness of forethought . ”
The company did not immediately reply to TechCrunch ’s interrogative sentence .
Sumo Logic says there is no indication that the fellowship ’s internet or systems have been impacted and say customer datum “ has been and remains inscribe . ” However , the company is send word customers to “ rotate credentials that are either used to access Sumo Logic or that you have provided to Sumo Logic to get at other systems . ”
The company says users should straightaway revolve their API access keys and should also reset Sumo Logic - installed collector certificate , third - company credentials that have been stored with Sumo , such as certification for S3 access code and user countersign for Sumo Logic accounts .
Sumo Logic , which was take individual earlier this year after being acquire by private fairness firm Francisco Partners for $ 1.7 billion , saysit has more than 2,100 customers , including23andMe , Okta and Samsung .
“ We are continuing to thoroughly investigate the origin and extent of this incident , ” the company enunciate . It tot up that it has place the potentially exposed credentials and has added spare security measures “ to further protect our systems , ” including improved monitoring .
Join us at TechCrunch Sessions: AI
Exhibit at TechCrunch Sessions: AI
Sumo Logic has not said how many certificate were compromised or how these credentials were compromised .
“ While the investigating into this incident is ongoing , we stay on attached to doing everything we can to advance a dependable and secure digital experience , ” the company said . “ We will straight notify customers if grounds of malicious access to their Sumo Logic accounts is incur . ”
JumpCloud resets customer API keys mention ‘ on-going incident ’