WatchGuard: Kaseya VSA Attack: What You Need to Know
On Friday, July 2, some MSPs using the on-premises version of Kaseya VSA suffered ransomware attacks that trickled down to their customers. Kaseya says around 1,500 companies (so far), many customers of MSPs, have been affected and the attackers (Revil gang) are asking $70 million in ransom. The attack exploited unpatched vulnerabilities in the Kaseya product that Kaseya is working on fixing ASAP. Learn More About How to Defend Against the Kaseya VSA Ransomware Attack Read our Secplicity blog post for everything you need to know about the attack Attend our webinar, “Learnings from the Kaseya Supply Chain Attack and Mass Ransomware Incident,” taking place on July 8, 2021 at 8:00 am PDT (3:00 pm GMT). Register Here Read our white paper, “Defeating Ransomware with Unified Security from WatchGuard” Anyone using an on-premises Kaseya VSA server (does not seem to affect the SaaS version) should turn it off or remove it from your network until Kaseya releases the fix. WatchGuard’s endpoint products like WatchGuard EPDR, Panda AD360, and others, can catch the dropped ransomware. If you have any other questions about how WatchGuard can help defend your business and your customers from ransomware, please speak with your account manager. To Your Success, The WatchGuardONE Team |
Dell Software Group sold to help fund looming EMC deal
Ingram Micro gets distribution access to Dell’s security range in Australia