<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>REvil Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/revil/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/revil/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 08 Jul 2021 16:25:03 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>REvil Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/revil/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 086 Supply Chain Hacks</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-086-supply-chain-hacks/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 09 Jul 2021 01:15:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Due Diligence]]></category>
		<category><![CDATA[Independent Assessment]]></category>
		<category><![CDATA[Kaseya]]></category>
		<category><![CDATA[Kaseya Hack]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[REvil]]></category>
		<category><![CDATA[REvil Ransomware]]></category>
		<category><![CDATA[Sodinokibi]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[SolarWinds Hack]]></category>
		<category><![CDATA[Supply Chain]]></category>
		<category><![CDATA[Supply Chain Hacks]]></category>
		<category><![CDATA[Supply Chain Risk]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2564</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 86. This week were going to talk about Supply Chain Hacks. This sounds familiar Back in #WeekendWisdom number 41, I talked about supply chain risks. Since then there have been a couple of massive global supply chain hacks that have occurred. What are these supply chain hacks you speak of? The&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-086-supply-chain-hacks/">#WeekendWisdom 086 Supply Chain Hacks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 86. This week were going to talk about Supply Chain Hacks.<span id="more-2564"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2564-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4</a></video></div>
<h3>This sounds familiar</h3>
<p>Back in <a href="https://www.l2cybersecurity.com/weekendwisdom-041-supply-chain-risk/" target="_blank" rel="noopener">#WeekendWisdom number 41</a>, I talked about supply chain risks. Since then there have been a couple of massive global supply chain hacks that have occurred.</p>
<h3>What are these supply chain hacks you speak of?</h3>
<p>The first one was late last year. The SolarWinds hack was revealed. SolarWinds makes network monitoring software that are used by large corporates and government agencies.</p>
<p>But for my audience, which will be the more smaller business owner, something happened last week. A company called Kaseya, they provide software for IT managed service providers who obviously look after the IT for their customers which are usually small businesses. This software enables those managed service providers to be able to remotely manage and control their client&#8217;s devices.</p>
<h3>What happened with the Kaseya hack?</h3>
<p>Well Kaseya were hacked and had their client&#8217;s devices were ransomed by the REvil ransomware gang. Now REvil claim that they have infected a million devices around the globe and they&#8217;re looking for $70 million to free up these devices. The whole story is still playing out, so we don&#8217;t know the full details of it yet.</p>
<h3>What can you do about this type of risk?</h3>
<p>But how would you, as a small business owner, be able to try and protect yourself from such a supply chain hack?</p>
<p>Well you really do need to make sure that any third party that is going to put some kind of service or device or software into your network, into your environment, to carry out a full, thorough due diligence on that supplier and their application.</p>
<p>If you don&#8217;t have the capability in-house, there&#8217;s plenty of people out there in the market and in the business that will be able to provide you with an independent assessment.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-086-supply-chain-hacks/">#WeekendWisdom 086 Supply Chain Hacks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4" length="37504000" type="video/mp4" />

			</item>
	</channel>
</rss>
