Christopher GLEMOT

Data Management & Security Team Leader | Technical specialist around Data, Security, Backup, Disaster Recovery, Cloud, Governance, Virtualization and Storage | Veeam Vanguard 2016-21 & VMCE | Founder of ArmoricanCloud.com | Owner of original-network.com

Most commented posts

  1. Step by Step Guide Veeam Agent for Windows — 41 comments
  2. Step by Step Guide Veeam B&R 9.5 Upgrade (v9 to v9.5) — 27 comments
  3. Veeam Availability Suite 9.5 first full availability solution! — 23 comments
  4. VeeamON New Orleans – Veeam Availability Suite 10 – Some new features announced! — 19 comments
  5. Script to disable UAC Server on Windows Server 2016 — 18 comments

Author's posts

Hackers love it when you post pictures of your work environment

Hackers love it when you post pictures of your work environment! We are all proud of what we are doing and proud of the great companies we are working in. But by taking pictures of your work environment for LinkedIn or your career blog you are unintentionally disclosing information about your technical setup. This is …

Continue reading

Advertisement

The core function of a SOC

The core function of a SOC (Security Operations Center) is to investigate, monitor, prevent, and respond to threats. SOC teams benefit from using a single platform with integrated yet disparate technologies for a full-picture view that is continually updated with emerging threat intelligence. This unified perspective simplifies security monitoring, supports incident response workflows, and provides …

Continue reading

Advertisement

Play ransomware infection routine

A ransomware gang named “Play” was discovered on the Dark Web. Along with them, a list of 22 victims has been revealed. There is a piece of evidence that points to a possible connection between Play ransomware and Quantum ransomware, which is an offshoot of the notorious Conti ransomware group. The Cobalt Strike beacons that …

Continue reading

Advertisement

Identify a piece of malware with Yara

Yara rules classify and identify malware samples by creating descriptions of malware families (it is a tool used to identify files, based on textual or binary pattern). YARA rules are like a piece of programming language, they work by defining a number of variables that contain patterns found in a sample of malware. If some …

Continue reading

Critical Veeam Backup for Google Cloud Vulnerability – CVE-2022-43549

A critical security vulnerability has been discovered in Veeam Backup for Google Cloud (KB4374). If you don’t have automatic updates enabled, then better take a look at this.

Continue reading

error

Enjoy this blog? Please spread the word :)