Plaintext: One Year Since Kaseya
Source: Toby Osborn via Unsplash.com

Plaintext: One Year Since Kaseya

Welcome to Dark Reading in Plaintext, where each day we bring you insights around one topic important to cybersecurity professionals. This month marks the one year anniversary of the attack against Kaseya. What has changed in the past year? Let us know your ideas in the comments.

July marks the one-year anniversary of the?Kaseya attack , when the Russia-linked REvil ransomware-as-a-service group compromised the company via an authentication bypass to distribute ransomware. The attack is part of a growing trend of cybercriminals and espionage operators targeting the suppliers of administrative software used by companies to manage their environments. Previously, ransomware and nation-state groups had successfully compromised?remote-management provider SolarWinds ,?Ukraine-based accounting software M.E.Doc , and?system management software Piriform . In each case, malicious code hidden in a software update allowed the attack to spread to a large number of the vendor's customers. (Read more When Software Updates Get Hacked )

What has happened since?

Headlines on Tap

Subscribe to get the latest headlines delivered to you each morning with Dark Reading Daily .

On That Note

The four finalists for the first-ever Innovation Spotlight has been selected: KeyCaliber, Normalize, Phylum, and Tromzo. These four will present their solution in front of a panel of judges on Aug. 10 in Las Vegas during Black Hat.

multiple colored spotlights pointing onto a stage

Source: David von Diemar via Unsplash

要查看或添加评论,请登录

社区洞察

其他会员也浏览了