NSW Department of Education suffers cyber security attack

NSW Department of Education suffers cyber security attack

Credit: 105074399 © Ihor Svetiukha | Dreamstime.com The NSW Department of Education has been hit by a cyber attack, with a number of internal systems being deactivated as a precautionary measure. The internal systems have been made unavailable since late Wednesday, with NSW Education secretary Georgina Harrisson claiming the shutdown was in an attempt to…

Microsoft’s Emergency Patch Fails to Fully Fix PrintNightmare RCE Vulnerability

Microsoft’s Emergency Patch Fails to Fully Fix PrintNightmare RCE Vulnerability

Even as Microsoft expanded patches for the so-called PrintNightmare vulnerability for Windows 10 version 1607, Windows Server 2012, and Windows Server 2016, it has come to light that the fix for the remote code execution exploit in the Windows Print Spooler service can be bypassed in certain scenarios, effectively defeating the security protections and permitting…

In crosshairs of ransomware crooks, cyber insurers struggle, IT News, ET CIO

In crosshairs of ransomware crooks, cyber insurers struggle, IT News, ET CIO

BOSTON: In the past few weeks, ransomware criminals claimed as trophies at least three North American insurance brokerages that offer policies to help others survive the very network-paralyzing, data-pilfering extortion attacks they themselves apparently suffered. Cybercriminals who hack into corporate and government networks to steal sensitive data for extortion routinely try to learn how much…

Microsoft Issues PrintNightmare Security Update

Microsoft Issues PrintNightmare Security Update

Governance & Risk Management , IT Risk Management , Patch Management Company Also Updates Risk Mitigation Advice Prajeet Nair (@prajeetspeaks) • July 6, 2021     Install updates now or disconnect Print Spooler to mitigate PrintNightmare vulnerability. (Source: Wikihow) This story has been updated. See Also: Live Panel | Zero Trusts Given- Harnessing the Value…

Kaseya Vulnerabilities First Spotted in April

Kaseya Vulnerabilities First Spotted in April

Endpoint Security , Fraud Management & Cybercrime , Ransomware Dutch Researchers First Notified Kaseya in April of Vulnerabilities Dan Gunderman (dangun127) • July 7, 2021     Kaseya CEO Fred Voccola has defended his company’s actions but acknowledged those affected by a ransomwware attack are “very, very frustrated.” (Source: Kaseya) Miami-based software company Kaseya worked…

Supply-chain attack on Kaseya remote management software targets MSPs

Supply-chain attack on Kaseya remote management software targets MSPs

Over 1,000 businesses from around the world have reportedly been impacted in a supply-chain attack where hackers exploited a vulnerability in a remote computer management tool called Kaseya VSA to deploy the REvil ransomware. Kaseya shut down its cloud-based service and urged all users with on-premises deployments, which includes many managed services providers (MSPs), to…

Kaseya VSA Supply-Chain Ransomware Advisory

Kaseya VSA Supply-Chain Ransomware Advisory

Background On July 2, 2021, Kaseya, an IT Management software firm, disclosed a security incident impacting their on-prem version of Kaseya VSA software. Kaseya VSA is a cloud-based MSP platform that allows service providers to perform patch management, backups, and client monitoring for their customers. As per Kaseya, the majority of their customers that rely…