Episode 52, thats 52 weeks straight we been at it!!!

Thank you to everyone who has stopped by over the past 52 weeks!

Kaseya Supply Chain hack impacts 1000s

www.scmagazine.com: Kaseya offers pre-patch instructions for on-prem VSA customers

www.zdnet.com: Kaseya ransomware attack updates: Your questions answered

us-cert.cisa.gov: CISA-FBI Guidance for MSPs and their Customers Affected by the Kaseya VSA Supply-Chain Ransomware Attack

arstechnica.com: Up to 1,500 businesses infected in one of the worst ransomware attacks ever

www.darkreading.com: Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours

Micrsoft’s Printnighmare 

arstechnica.com: Microsoft’s emergency patch fails to fix critical “PrintNightmare” vulnerability

www.theregister.com: Microsoft struggles to wake from PrintNightmare: Latest print spooler patch can be bypassed, researchers say

www.bleepingcomputer.com: Microsoft’s incomplete PrintNightmare patch fails to fix vulnerability

www.bleepingcomputer.com: Microsoft shares mitigations for Windows PrintNightmare zero-day bug

Cyberinsurance is pulling itself together, for real

www.cyberscoop.com: Two cyber insurance industry initiatives grapple with rise of ransomware

cyberacuview.com: Consortium of Leading Cyber Insurers Announce the Launch of CyberAcuView

Mongolian Certificate Authority Website Compromised

thehackernews.com: Mongolian Certificate Authority Hacked to Distribute Backdoored CA Software

Share that link with your friends, or share this one, either helps this podcast grow!

Follow me on twitter at: @attiliojr

Feeling Generous and want to show your support?

algorand: E3HYLC56IHAFXPPA2WZCLBYAVFX42GVFDC7BDAXAQWNI3BXGHF3KDILMSY

bitcoin: bc1qls47sszwqxwpad66pn6awxr0ex9s4d33t3t2zw

Cosmos: cosmos107ng80lsqhwqxeawajjt6cywmu5nhlt3drvddf

BAT: 0x1d17d7Ee7d1BF9F53DEF2CEf4558D05ed9172A86

Paypal: https://streamelements.com/professorcyberrisk/tip

Leave a Reply

Your email address will not be published. Required fields are marked *

Series Playlist