Topics

Latest

AI

Amazon

Article image

Image Credits:Boris Zhitkov / Getty Images

Apps

Biotech & Health

clime

an illustrated hand holding a key about to enter a lock on a darkened pink background

Image Credits:Boris Zhitkov / Getty Images

Cloud Computing

commercialism

Crypto

endeavour

EVs

Fintech

Fundraising

widget

Gaming

Google

Government & Policy

ironware

Instagram

layoff

Media & Entertainment

Meta

Microsoft

concealment

Robotics

Security

Social

quad

Startups

TikTok

transferral

Venture

More from TechCrunch

Events

Startup Battlefield

StrictlyVC

Podcasts

video

Partner Content

TechCrunch Brand Studio

Crunchboard

Contact Us

Sumo Logic , a U.S.-based cloud data analytics and log analytic thinking company , is urge on exploiter to reset API keystone after discover a protection breach .

In asecurity noticepublished this week , Sumo Logicconfirmed it had light upon evidence of a possible security incident on November 3 . The incident involved an attacker using compromised certification to get at a Sumo Logic AWS account . After discover the incident , Sumo Logic pronounce it locked down the exposed infrastructure and rotated every potentially exposed certification for their base “ out of an copiousness of forethought . ”

The company did not immediately reply to TechCrunch ’s interrogative sentence .

Sumo Logic says there is no indication that the fellowship ’s internet or systems have been impacted and say customer datum “ has been and remains inscribe . ” However , the company is send word customers to “ rotate credentials that are either used to access Sumo Logic or that you have provided to Sumo Logic to get at other systems . ”

The company says users should straightaway revolve their API access keys and should also reset Sumo Logic - installed collector certificate , third - company credentials that have been stored with Sumo , such as certification for S3 access code and user countersign for Sumo Logic accounts .

Sumo Logic , which was take individual earlier this year after being acquire by private fairness firm Francisco Partners for $ 1.7 billion , saysit has more than 2,100 customers , including23andMe , Okta and Samsung .

“ We are continuing to thoroughly investigate the origin and extent of this incident , ” the company enunciate . It tot up that it has place the potentially exposed credentials and has added spare security measures “ to further protect our systems , ” including improved monitoring .

Join us at TechCrunch Sessions: AI

Exhibit at TechCrunch Sessions: AI

Sumo Logic has not said how many certificate were compromised or how these credentials were compromised .

“ While the investigating into this incident is ongoing , we stay on attached to doing everything we can to advance a dependable and secure digital experience , ” the company said . “ We will straight notify customers if grounds of malicious access to their Sumo Logic accounts is incur . ”

JumpCloud resets customer API keys mention ‘ on-going incident ’