SecOps Tools and 2021 Security Incidents: Kaseya Ransomware Attack

placeholder

Supply chain attacks are particularly stealthy and have the potential to inflict considerable damage that can have lasting repercussions. Cybersecurity professionals need to proactively monitor traffic to stay ahead of these types of attacks and other potential threats. Begin this course by exploring the background of the Kaseya ransomware attack and how it was discovered. Then examine what led to the breach and how the attack affected Kaseya’s clientele of multiple managed service providers (MSPs) and as a result many small businesses downstream. Investigate the various tools like SQL injection that could be used to conduct this type of attack. Finally take a look at the cybersecurity community response to the breach and the fallout for Kaseya from the event. Once you have completed this course you should understand the background of the Kaseya ransomware attack how to use tools to conduct a similar type of attack and how Kaseya and the government responded to the breach.