![]() ![]() Under the original timeline, the patch for the on-premises version of Kaseya VSA would have been available within 24 hours of completing the SaaS deployment. The layer “greatly reduces the attack surface of Kaseya VSA overall,” the company said. After determining that attackers were not targeting the SaaS platform, Kaseya began the process of restoring SaaS VSA - and “configuring an additional layer” for security - on Tuesday afternoon. After discovering that attackers had compromised Kaseya VSA and were delivering ransomware to networks being managed by the tool, Kaseya brought down the SaaS version of Kaseya VSA and instructed customers to shut down the on-premises servers to prevent further attacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |