<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Solarwinds on it-learn.io | IT, Networking &amp; Cybersecurity Blog</title><link>https://blog.it-learn.io/tags/solarwinds/</link><description>Recent content in Solarwinds on it-learn.io | IT, Networking &amp; Cybersecurity Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 08 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.it-learn.io/tags/solarwinds/index.xml" rel="self" type="application/rss+xml"/><item><title>Supply Chain Attack: How SolarWinds Compromised 18,000 Organizations with One Update</title><link>https://blog.it-learn.io/posts/2026-04-08-supply-chain-attack-solarwinds-explained/</link><pubDate>Wed, 08 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-04-08-supply-chain-attack-solarwinds-explained/</guid><description>&lt;p&gt;The SolarWinds attack did not begin with a phishing email or a misconfigured firewall. It began inside a build server — the trusted forge where software is assembled, signed, and shipped. By the time 18,000 organizations downloaded the trojaned Orion update in the spring of 2020, the attackers had already achieved something far more dangerous than a network intrusion: they had weaponized trust itself.&lt;/p&gt;
&lt;p&gt;This post dissects the technical mechanics of the SUNBURST backdoor, the Orion build pipeline compromise, DGA-based command and control, and the detection and defense strategies that can limit your exposure to this class of attack.&lt;/p&gt;</description></item></channel></rss>