<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Kaseya Management Software threat in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Kaseya-Management-Software-threat/m-p/46305#M342</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some interesting updates to keep you on your toes:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cnet.com/news/ransomware-attack-on-kaseya-a-software-firm-threatens-businesses-worldwide/" target="_blank"&gt;https://www.cnet.com/news/ransomware-attack-on-kaseya-a-software-firm-threatens-businesses-worldwide/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://us-cert.cisa.gov/ncas/current-activity/2021/07/02/kaseya-vsa-supply-chain-ransomware-attack" target="_blank"&gt;https://us-cert.cisa.gov/ncas/current-activity/2021/07/02/kaseya-vsa-supply-chain-ransomware-attack&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Mon, 05 Jul 2021 05:07:09 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2021-07-05T05:07:09Z</dc:date>
    <item>
      <title>Kaseya Management Software threat</title>
      <link>https://community.isc2.org/t5/Threats/Kaseya-Management-Software-threat/m-p/46303#M340</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am really surprised that others have not raised the alarms bells on this supply chain attack this weekend?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know it is a national holiday, but there is no excuse to rest on your laurels.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cert.govt.nz/it-specialists/advisories/kaseya-management-software-being-used-to-deploy-ransomware/" target="_blank"&gt;https://www.cert.govt.nz/it-specialists/advisories/kaseya-management-software-being-used-to-deploy-ransomware/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.rnz.co.nz/news/world/446144/kaseya-vsa-ransomware-attack-biden-orders-probe" target="_blank"&gt;https://www.rnz.co.nz/news/world/446144/kaseya-vsa-ransomware-attack-biden-orders-probe&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.washingtonpost.com/technology/2021/07/02/kaseya-ransomware-attack/" target="_blank"&gt;https://www.washingtonpost.com/technology/2021/07/02/kaseya-ransomware-attack/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Having dug around, it is obvious almost everyone has gone to sleep at the wheel?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You cannot afford to sleep at the wheel, despite the long haul battle, unfortunately the attackers do not sleep and are happy to exploit any lapse - so everyone wake up, protect yourselves quickly and protect your organisations turn off any Kaseya VSA servers immediately.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have been warned!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:56:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Kaseya-Management-Software-threat/m-p/46303#M340</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:56:00Z</dc:date>
    </item>
    <item>
      <title>Re: Kaseya Management Software threat</title>
      <link>https://community.isc2.org/t5/Threats/Kaseya-Management-Software-threat/m-p/46304#M341</link>
      <description>&lt;P&gt;HI All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;More details can be found here:&amp;nbsp; &lt;A href="https://www.wired.com/story/kaseya-supply-chain-ransomware-attack-msps/?bxid=5cc9e0b62ddf9c1a7add2e37&amp;amp;cndid=48488471&amp;amp;esrc=desktopInterstitialF&amp;amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;amp;utm_brand=wired&amp;amp;utm_campaign=aud-dev&amp;amp;utm_mailing=WIR_Daily_070321&amp;amp;utm_medium=email&amp;amp;utm_source=nl&amp;amp;utm_term=list1_p4" target="_blank" rel="noopener"&gt;https://www.wired.com/story/kaseya-supply-chain-ransomware-attack-msps/?bxid=5cc9e0b62ddf9c1a7add2e37&amp;amp;cndid=48488471&amp;amp;esrc=desktopInterstitialF&amp;amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;amp;utm_brand=wired&amp;amp;utm_campaign=aud-dev&amp;amp;utm_mailing=WIR_Daily_070321&amp;amp;utm_medium=email&amp;amp;utm_source=nl&amp;amp;utm_term=list1_p4&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well worth reading and taking appropriate action.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Further information has come to light:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.securityweek.com/it-software-firm-kaseya-hit-supply-chain-ransomware-attack" target="_blank"&gt;https://www.securityweek.com/it-software-firm-kaseya-hit-supply-chain-ransomware-attack&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 06:38:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Kaseya-Management-Software-threat/m-p/46304#M341</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-07-04T06:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: Kaseya Management Software threat</title>
      <link>https://community.isc2.org/t5/Threats/Kaseya-Management-Software-threat/m-p/46305#M342</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some interesting updates to keep you on your toes:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cnet.com/news/ransomware-attack-on-kaseya-a-software-firm-threatens-businesses-worldwide/" target="_blank"&gt;https://www.cnet.com/news/ransomware-attack-on-kaseya-a-software-firm-threatens-businesses-worldwide/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://us-cert.cisa.gov/ncas/current-activity/2021/07/02/kaseya-vsa-supply-chain-ransomware-attack" target="_blank"&gt;https://us-cert.cisa.gov/ncas/current-activity/2021/07/02/kaseya-vsa-supply-chain-ransomware-attack&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 05:07:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Kaseya-Management-Software-threat/m-p/46305#M342</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-07-05T05:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: Kaseya Management Software threat</title>
      <link>https://community.isc2.org/t5/Threats/Kaseya-Management-Software-threat/m-p/46320#M343</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the next enthralling episode:&amp;nbsp; The attackers are now demanding US$70 Million ransom so you can have your data back - very nice you Rotters.&amp;nbsp;&amp;nbsp; They are pricing themselves out of a market, and setting themselves up for failure, due to the fact more and more organisations are preparing their own countermeasures.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.itnews.com.au/news/kaseya-boss-says-up-to-1500-businesses-affected-by-ransomware-attack-566942?eid=65&amp;amp;edate=20210706&amp;amp;utm_source=20210706&amp;amp;utm_medium=newsletter&amp;amp;utm_campaign=sc_weekly" target="_blank"&gt;https://www.itnews.com.au/news/kaseya-boss-says-up-to-1500-businesses-affected-by-ransomware-attack-566942?eid=65&amp;amp;edate=20210706&amp;amp;utm_source=20210706&amp;amp;utm_medium=newsletter&amp;amp;utm_campaign=sc_weekly&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jul 2021 05:41:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Kaseya-Management-Software-threat/m-p/46320#M343</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-07-06T05:41:32Z</dc:date>
    </item>
    <item>
      <title>Re: Kaseya Management Software threat</title>
      <link>https://community.isc2.org/t5/Threats/Kaseya-Management-Software-threat/m-p/46340#M344</link>
      <description>&lt;P&gt;Hi All, Another update, now they are demanding 50 Million in Bitcoin according to the Verizon report:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It also provides a concise update on how it works, so be prepared.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://aliliaquat.com/kaseya-ransomware-attack-hackers-now-demand-us-50million-in-bitcoin-for-the-return-of-user-data/" target="_blank"&gt;https://aliliaquat.com/kaseya-ransomware-attack-hackers-now-demand-us-50million-in-bitcoin-for-the-return-of-user-data/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jul 2021 21:44:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Kaseya-Management-Software-threat/m-p/46340#M344</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-07-06T21:44:00Z</dc:date>
    </item>
    <item>
      <title>Re: Kaseya Management Software threat</title>
      <link>https://community.isc2.org/t5/Threats/Kaseya-Management-Software-threat/m-p/46414#M348</link>
      <description>&lt;P&gt;&lt;A href="https://www.msn.com/en-us/news/technology/firm-hacked-to-spread-ransomware-had-previous-security-flaws/ar-AAM6HP0?ocid=msedgntp" target="_blank"&gt;Firm hacked to spread ransomware had previous security flaws (msn.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"Ensuring that each and every piece of database access code is immune to SQL injection is essentially impossible," said their lawsuit.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;“In the business we’re in, and the number of endpoints we manage around the world, as you might expect, &lt;STRONG&gt;we take security extremely seriously&lt;/STRONG&gt;," Ronan Kirby, president of the company's European operations, said at a Belgian cybersecurity conference Thursday.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ah...well in that case, all transgressions can be forgiven. &lt;span class="lia-unicode-emoji" title=":face_with_rolling_eyes:"&gt;🙄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jul 2021 17:33:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Kaseya-Management-Software-threat/m-p/46414#M348</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2021-07-13T17:33:48Z</dc:date>
    </item>
  </channel>
</rss>

