skip to Main Content
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the privacy policy. To learn more or withdraw consent please click on Learn More. By continued use of this website you are consenting to our use of cookies.

The Kaseya/REvil Attack Explained

Why it Matters and How to Protect Yourself What Happened? At around 1400 EDT on July 2, attackers appear to have used a 0-day authentication bypass vulnerability in Internet-exposed instances of the Kaseya Virtual System Administrator (VSA) server software, a…

Read More

Three Common Ways Organizations Get Hacked

When it comes to security teams, one of the biggest priorities is reducing risk. A big part of reducing risk is creating a cybersecurity risk management strategy. As the world becomes more reliant on digital technology, risk management is becoming…

Read More
Back To Top