Kaseya Rolls Out Patches For VSA Bugs Exploited In Ransomware Attack best cc sites 2021, unicc new site

Kaseya has finally rolled out the patches for VSA bugs that the REvil ransomware gang exploited. The firm urges clients check for previous compromise before deploying the patches.
Days after the devastating ransomware attack, Kaseya has finally released the patches for VSA server that was found to be under active exploit.
As reported earlier , the firm confirmed that the ransomware attackers didn’t alter the VSA codebase. Rather they exploited unpatched vulnerabilities for the wave of attacks on Kaseya’s customers.
All of this happened when the firm was in the middle of patching the vulnerabilities following reports from the Dutch Institute for Vulnerability Disclosure (DIVD).
According to Kaseya’s advisory , VSA 9.5.7a Release is out now for on-premise and SaaS customers. It includes fixes for the following issues.
Kaseya has advised users to check the “ VSA On-Premises Hardening and Best Practice Guide ” and “ VSA SaaS Security Best Practices Guide ” before applying the fixes.
The firm also explained that deploying these fixes will cause a password reset for the users with improved security requirements. Briefly, the new policies require password change less than 30 days, the password should be a minimum of 16 characters long, and that reuse not be more than 5 passwords.
The REvil ransomware gang demanded a cumulative ransom of $70 million for a universal decryptor.
However, Bleeping Computer has reported that many of the victims do not intend to pay the ransom. Though exceptions are there, most of the victim MSPs will be restoring their data from backups.
best cc sites 2021 unicc new site