After the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday released a recovery script for organizations affected by a massive ransomware attack targeting VMWare ESXi servers worldwide, reports surfaced that the malware evolved in a way that made earlier recovery procedures ineffective.
The attacks, aimed at VMware’s ESXi bare metal hypervisor, were first made public February 3 by the French Computer Emergency Response Team (CERT-FR), and target ESXi instances running older versions of the software, or those that have not been patched to current standards. Some 3,800 servers have been affected globally, CISA and the FBI said.
To read this article in full, please click here
http://dlvr.it/SjBB53
Langganan:
Posting Komentar (Atom)
Versa extends SASE platform to the LAN edge
Versa Networks has bumped up its secure access service edge (SASE) software with a variety of features, including AI to help customers bette...
-
As connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an...
-
The upcoming cloud system will provide an added layer of network and data handling security for companies working on national security and d...
-
AI-generating malware, deep fake identity spoofing, and state-sponsored ransomware are just a few of the latest methods that attackers are u...
Tidak ada komentar:
Posting Komentar