When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Apparently, a threat actor used stolen credentials to enter the companysAmazonWeb Services (AWS) account.
“We are continuing to thoroughly investigate the origin and extent of this incident.
Image Credit: Pixabay
We have identified the potentially exposed credentials and have added extra security measures to further protect our systems.”
These extra security measures include enhanced monitoring and addressing potential vulnerabilities.
Sumo Logic will also continue monitoring online grid and system logs for further indicators of compromise.
“We will directly notify customers if evidence of malicious access to their Sumo Logic accounts is found.
Customers may find updates at our Security Response Center.”
It provides log management and analytics services that use machine-generated big data.
The company was founded in early 2010, and is headquartered in Redwood City, California.