accent 1 accent 2
Icon-Check@3x
ACTIVE THREAT UPDATE

REvil MSP Ransomware Attack

What You Need to Know

Wed, July 7 | 11:00 am ET

This weekend, the REvil ransomare gang exploited a vulnerability in network management software used by many Managed Service Providers, effectively distributing ransomware downstream to hundreds of organizations (and counting).

Join our Sr. Director of Incident Response for a threat update that covers everything we know about the REvil hacking group, analysis of the attack, as well as mitigation and recovery steps.

It’ll be recorded, so if you can’t make it, register and we’ll send you the replay.

+ 1 CPE

Register Now

About this webinar

Learn exactly how the REvil Ransomware gang was able to target Kaseya VSA and execute the supply-chain attack.

Attend this Varonis threat update to learn:
  • The chain of events leading up to and beyond the attack
  • How to determine if you are at risk
  • Steps to mitigate your risk
  • What recovery actions to take if you have been impacted
Matt-Radolec-Varonis
Matt Radolec Sr. Director of Security Architecture & Incident Response, Varonis
Headshot_RobSobers_202007
Rob Sobers VP, Varonis

“We completely eradicated our global access problem (over 40,000 sensitive folders open to everyone) in 17 days without breaking anything. I couldn’t believe it.”

CISO, Major Online Retailer

Want to see Varonis in action?

Request a demo