The Key to Securing Legacy Computing Systems

Home / Articles / External / Government


April 18, 2023 | Originally published by DARPA on April 10, 2023

DARPA wants to overhaul legacy software to stop cyberattackers in their tracks when they penetrate a system.

For a cyberattack to be successful, one must conduct a sequence of exploits to move from the initial system access, through privilege escalation and lateral motion steps, until reaching the ultimate target. The SolarWinds attack started by compromising the email account of a SolarWinds employee. This foothold was followed by other exploits to access SolarWinds’ development environment and insert a backdoor into the SolarWinds product, ultimately compromising over 18,000 organizations.

Focus Areas