logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Microsoft Sets Aside $425M for Anticipated GDPR Fine
  • Google Patches Third Chrome Zero-Day of 2023
  • Threat Hunting: Shifting Gears in Query Tuning
  • Shadow IT is increasing and so are the associated security risks
  • The Updated OWASP API Security Top 10 for 2023 is Here

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-3026 (drawio) 1 June 2023
  • CVE-2023-23955 (advanced_secure_gateway, content_analysis) 1 June 2023
  • CVE-2023-23953 (advanced_secure_gateway, content_analysis) 1 June 2023
  • CVE-2023-23954 (advanced_secure_gateway, content_analysis) 1 June 2023
  • CVE-2023-23952 (advanced_secure_gateway, content_analysis) 1 June 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

REvil ransomware actors attack Kaseya in supply chain attack

Posted on 3 July 2021

From blog.talosintelligence.com

Attackers are actively exploiting the Kaseya VSA endpoint monitoring software to conduct a widespread supply chain attack targeting a number of Managed Service Providers (MSPs), according to multiple reports. Organizations usually use Kaseya VSA to perform centralized orchestration of systems in customer environments.

Read more…

Posted in News

Post navigation

Previous post: New Mirai-Inspired Botnet Could Be Using Your KGUARD DVRs in Cyber Attacks
Next post: Telnet service left enabled and without a password on SIMATIC HMI Comfort Panels
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.