1m computers affected, $US70m ransomware demand – Ransomware as a Service made scalable by means of a supply chain attack!
Similar to the Solarwinds hack last year, cyber criminals managed to infiltrate the systems of a managed IT services software provider, in this instance Kaseya. Once in there, a management software “update” was deployed to 1m+ computers according to the hackers and ransomware was pushed through it to hundreds of medium businesses.
It’s a great example that demonstrates why there is never 100% of cyber protection. BUT, a business has to do better than the 47% antivirus alone provides. Our Jam Cyber Security Framework delivers 95.8%. Double your Cyber Security today! https://lnkd.in/d7KRs_h
1m computers affected, $US70m ransomware demand – Ransomware as a Service made scalable by means of a supply chain attack!
Similar to the Solarwinds hack last year, cyber criminals managed to infiltrate the systems of a managed IT services software provider, in this instance Kaseya.
Once in there, a management software “update” was deployed to 1m+ computers according to the hackers and ransomware was pushed through it to hundreds of medium businesses.
It’s a great example that demonstrates why there is never 100% of cyber protection. BUT, a business has to do better than the 47% antivirus alone provides. Our Jam Cyber Security Framework delivers 95.8%. Double your Cyber Security today! https://lnkd.in/d7KRs_h
Full (technical) article about the latest hack on July 4th: https://lnkd.in/dwhXDQZ
You may also be interested in:
What is Ransomware?
What is Application Hardening?
What are Administrative Privileges?
What is Multifactor Authentication?
What are Man-in-the-Middle Attacks?
Check out our YouTube channel: Jam Cyber – YouTube Channel
Related Posts:
(Password) Size DOES Matter
Cyber CEO – (Password) Size DOES Matter A recent study has inflamed the old conversation about password length: Using an
The 10 most notorious cyber crime gangs in the world
The 10 most notorious cyber crime gangs in the world Roughly four in five breaches emanate from organised crime.[i] Cyber
Know your legal obligations
Do you know your legal and ethical obligations if your business experiences a cyber attack? A cyber attack can be
10 Ways to ensure your business is protected from the Log4j vulnerability
10 ways to ensure your business is protected from the Log4j vulnerability In December 2021, a vulnerability was discovered in
Recent Posts
Categories