Plaintext: One Year Since Kaseya
Welcome to Dark Reading in Plaintext, where each day we bring you insights around one topic important to cybersecurity professionals. This month marks the one year anniversary of the attack against Kaseya. What has changed in the past year? Let us know your ideas in the comments.
July marks the one-year anniversary of the?Kaseya attack , when the Russia-linked REvil ransomware-as-a-service group compromised the company via an authentication bypass to distribute ransomware. The attack is part of a growing trend of cybercriminals and espionage operators targeting the suppliers of administrative software used by companies to manage their environments. Previously, ransomware and nation-state groups had successfully compromised?remote-management provider SolarWinds ,?Ukraine-based accounting software M.E.Doc , and?system management software Piriform . In each case, malicious code hidden in a software update allowed the attack to spread to a large number of the vendor's customers. (Read more When Software Updates Get Hacked )
What has happened since?
Headlines on Tap
领英推荐
Subscribe to get the latest headlines delivered to you each morning with Dark Reading Daily .
On That Note
The four finalists for the first-ever Innovation Spotlight has been selected: KeyCaliber, Normalize, Phylum, and Tromzo. These four will present their solution in front of a panel of judges on Aug. 10 in Las Vegas during Black Hat.
Source: David von Diemar via Unsplash