From 8a23e6c38abce492f18e9b3e9bb6b31c6d1afa4a Mon Sep 17 00:00:00 2001 From: JadonWill <117053393+JadonWill@users.noreply.github.com> Date: Fri, 10 Jan 2025 09:24:28 +0800 Subject: [PATCH] Update 20241220002 Corrected hyperlink syntax. --- docs/advisories/20241220002-BeyondTrust-Critical-Vuln.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/advisories/20241220002-BeyondTrust-Critical-Vuln.md b/docs/advisories/20241220002-BeyondTrust-Critical-Vuln.md index 52fea14d..42f4c63a 100644 --- a/docs/advisories/20241220002-BeyondTrust-Critical-Vuln.md +++ b/docs/advisories/20241220002-BeyondTrust-Critical-Vuln.md @@ -18,8 +18,8 @@ There is no evidence of exploitation affecting Western Australian Government net The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)): -- BeyondTrust: https://www.beyondtrust.com/trust-center/security-advisories/bt24-10 +- BeyondTrust: ## Additional References -- BleepingComputer: https://www.bleepingcomputer.com/news/security/beyondtrust-says-hackers-breached-remote-support-saas-instances/ +- BleepingComputer: