![]() Here’s what we know so far: Kaseya VSA was attacked using a currently unpatched zero-day vulnerability within the product. The company advised all of its clients to immediately shut down their VSA servers. This past Friday, the software vendor announced that its VSA product, which provides clients with remote control access to machines in their networks, had been compromised and used to infect Kaseya clients’ network environments with ransomware. Following on the heels of the SolarWinds SunBurst attack, we’re seeing a new supply chain attack unfolding with Kaseya.
0 Comments
Leave a Reply. |