"Sumo Logic Urges Users to Change Credentials Due to Security Breach"
Cloud monitoring, log management, and SIEM tools provider Sumo Logic recently discovered a security breach and is urging customers to change credentials. The company revealed on Tuesday that a "potential security incident" found on November 3 involved unauthorized access to a Sumo Logic AWS account through the use of compromised credentials. The company noted that there is no indication that the company's systems, networks, or customer data have been impacted. However, users have been advised to "rotate credentials that are either used to access Sumo Logic or that have been provided to Sumo Logic to access other systems." The company noted that the most urgent are API access keys, but as a precaution, users should also change Sumo Logic installed collector credentials, third-party credentials stored with Sumo, and user passwords for Sumo accounts. Sumo Logic said its investigation is ongoing, and it will directly notify customers if it discovers malicious access to accounts.
SecurityWeek reports: "Sumo Logic Urges Users to Change Credentials Due to Security Breach"