Skip to main content

White House task force met with private sector to discuss Microsoft software vulnerabilities

White House press secretary Jen Psaki speaks during a briefing at the White House in Washington, U.S., March 15, 2021.
White House press secretary Jen Psaki speaks during a briefing at the White House in Washington, U.S., March 15, 2021.
Image Credit: REUTERS/Kevin Lamarque/File Photo

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now


(Reuters) — The White House’s task force looking into the recent hack of Microsoft’s Exchange met this week with representatives of the private sector, White House spokesperson Jen Psaki said in a statement on Wednesday.

The group, which met on Monday, “included private sector members for the first time,” who were invited “based on their specific insights to this incident,” she said.

Hacking groups are using recently discovered flaws in the Exchange mail server software to break into targets around the world.

The White House group noted that paying to mitigate the hack “weighs particularly heavily on small businesses,” Psaki said.


AI Scaling Hits Its Limits

Power caps, rising token costs, and inference delays are reshaping enterprise AI. Join our exclusive salon to discover how top teams are:

  • Turning energy into a strategic advantage
  • Architecting efficient inference for real throughput gains
  • Unlocking competitive ROI with sustainable AI systems

Secure your spot to stay ahead: https://bit.ly/4mwGngO


The breadth of the exploitation has led to urgent warnings by authorities in the United States and Europe about the weaknesses found in Exchange.

The White House group “discussed the remaining number of unpatched systems, malicious exploitation, and ways to partner together on incident response, including the methodology partners could use for tracking the incident going forward,” Psaki said.

The security holes in the widely used mail and calendaring software leave the door open to industrial-scale cyber espionage, allowing malicious actors to steal emails virtually at will from vulnerable servers or to move elsewhere in the network. Tens of thousands of organizations have already been compromised, Reuters reported, and new victims are being made public daily.