
New critical RCE flaw in Veeam: when any domain user can compromise your backup servers
A critical vulnerability allows any domain user to remotely execute code on Veeam Backup & Replication servers attached to the domain – a nightmare for
Cybersecurity is an essential area of IT that focuses on protecting systems, networks and data from digital threats. It encompasses a variety of practices, tools and technologies designed to prevent attacks, damage and unauthorized access to information and systems. As our dependence on digital technologies increases, the need to secure our digital information and infrastructures becomes ever more crucial.
Cybersecurity threats can take many forms, from malware such as viruses and ransomware to phishing attacks and data breaches. In the face of these ever-evolving threats, cybersecurity professionals are working tirelessly to develop new methods of defense, raise public and corporate awareness of the importance of digital security, and ensure a safer online environment for all.
A critical vulnerability allows any domain user to remotely execute code on Veeam Backup & Replication servers attached to the domain – a nightmare for
More than 40,000 new computer vulnerabilities were discovered in 2024, a spectacular 38% increase on the previous year. Behind every CVE lies a potential entry
When ransomware strikes, the impact is immediate: locked files, interrupted activity and a daunting ransom message on your screens… This worrying situation nevertheless offers several
ShadowProtect is a disk-to-disk backup and recovery solution from Arcserve (formerly StorageCraft). It stands out for its speed, flexibility and reliability, but it is not
Backups are valuable safety nets for protecting your data. However, sometimes these backups are compromised or present vulnerabilities. In this article, we take a look
January 2025 saw a dynamic shift in ransomware activity, characterized by the resurgence of established ransomware groups, the emergence of new players and increasingly sophisticated
Cybersecurity threats continue to diversify, and attack techniques are evolving to circumvent the protections in place. Among these new forms of attack, doubleclickjacking stands out
Phishing attacks are one of the most serious threats to cybersecurity today. The constant evolution of techniques used by cybercriminals makes these attacks increasingly difficult
The Norauto chain, renowned for its car maintenance services, confirmed to an AFP journalist on Tuesday that it had been the victim ofa data leak
A joint report published by CISA, the FBI and the NSA, with the support of members of the Five Eyes alliance (USA, Australia, Canada, New
The CVE-2024-40711 vulnerability discovered in Veeam Backup & Replication continues to wreak havoc on unpatched systems. While this flaw had already enabled the Akira and
With threats such as ransomware and other cyber attacks on the increase, it has become essential to adopt innovative methods to protect sensitive data. Zero