The Key to Securing Legacy Computing Systems

Home / Articles / External / Government

Source: https://www.darpa.mil/DDM_Gallery/cpm-619.png
Source: https://www.darpa.mil/DDM_Gallery/cpm-619.png

April 18, 2023 | Originally published by DARPA on April 10, 2023

DARPA wants to overhaul legacy software to stop cyberattackers in their tracks when they penetrate a system.

For a cyberattack to be successful, one must conduct a sequence of exploits to move from the initial system access, through privilege escalation and lateral motion steps, until reaching the ultimate target. The SolarWinds attackĀ started by compromising the email account of a SolarWinds employee. This foothold was followed by other exploits to access SolarWindsā€™ development environment and insert a backdoor into the SolarWinds product, ultimately compromising over 18,000 organizations.

Focus Areas