Kaseya Patches Zero-Days Used in REvil Attacks
#1
Information 
Quote:Kaseya made good on its promise to issue patches by July 11.
 
On Saturday, the company behind the Virtual System/Server Administrator (VSA) platform that got walloped by the REvil ransomware-as-a-service (RaaS) gang in a massive supply-chain attack released urgent updates to address critical zero-day security vulnerabilities in VSA.
 
Kaseya released the VSA 9.5.7a (9.5.7.2994) update to fix three zero-day vulnerabilities used in the ransomware attacks.
 
The company said on its rolling advisory page that all of its software-as-a-service (SaaS) customers were back up as of this morning, while the company was still working to restore on-premises customers that needed help:
Quote:The restoration of services is now complete, with 100% of our SaaS customers live as of 3:30 AM US EDT. Our support teams continue to work with VSA On-Premises customers who have requested assistance with the patch. —Kaseya

Read more: Kaseya Patches Zero-Days Used in REvil Attacks | Threatpost
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Windows 11 Build 26300.8493 Brings Movab...
Microsoft has rele...harlan4096 — 16:55
Google Chrome 148.0.7778.167/168
The security updat...harlan4096 — 07:15
Microsoft Edge 148.0.3967.70
Version 148.0.3967...harlan4096 — 07:12
Vivaldi 7.9 Build 3970.67
Vivaldi 7.9 Build ...harlan4096 — 07:09
AdGuard Browser Extension 5.4.3.1
AdGuard Browser Ex...harlan4096 — 07:08

[-]
Birthdays
Today's Birthdays
avatar (45)mediumog
Upcoming Birthdays
avatar (28)akiratoriyama
avatar (48)Jerrycix
avatar (40)awedoli
avatar (82)WinRARHowTo
avatar (39)axuben
avatar (40)ihijudu
avatar (49)contjrat
avatar (50)Mirzojap
avatar (36)idilysaju
avatar (40)GregoryRog
avatar (40)odukoromu
avatar (46)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>