Episode 52, thats 52 weeks straight we been at it!!!
Thank you to everyone who has stopped by over the past 52 weeks!
Kaseya Supply Chain hack impacts 1000s
- www.scmagazine.com: Kaseya offers pre-patch instructions for on-prem VSA customers
- www.zdnet.com: Kaseya ransomware attack updates: Your questions answered
- us-cert.cisa.gov: CISA-FBI Guidance for MSPs and their Customers Affected by the Kaseya VSA Supply-Chain Ransomware Attack
- arstechnica.com: Up to 1,500 businesses infected in one of the worst ransomware attacks ever
- www.darkreading.com: Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Micrsoft's Printnighmare
- arstechnica.com: Microsoft’s emergency patch fails to fix critical “PrintNightmare” vulnerability
- www.theregister.com: Microsoft struggles to wake from PrintNightmare: Latest print spooler patch can be bypassed, researchers say
- www.bleepingcomputer.com: Microsoft's incomplete PrintNightmare patch fails to fix vulnerability
- www.bleepingcomputer.com: Microsoft shares mitigations for Windows PrintNightmare zero-day bug
Cyberinsurance is pulling itself together, for real
- www.cyberscoop.com: Two cyber insurance industry initiatives grapple with rise of ransomware
- cyberacuview.com: Consortium of Leading Cyber Insurers Announce the Launch of CyberAcuView
Mongolian Certificate Authority Website Compromised
- thehackernews.com: Mongolian Certificate Authority Hacked to Distribute Backdoored CA Software
Share that link with your friends, or share this one, either helps this podcast grow!
Follow me on twitter at: @attiliojr
Feeling Generous and want to show your support?
algorand: E3HYLC56IHAFXPPA2WZCLBYAVFX42GVFDC7BDAXAQWNI3BXGHF3KDILMSY
bitcoin: bc1qls47sszwqxwpad66pn6awxr0ex9s4d33t3t2zw
Cosmos: cosmos107ng80lsqhwqxeawajjt6cywmu5nhlt3drvddf
BAT: 0x1d17d7Ee7d1BF9F53DEF2CEf4558D05ed9172A86