Christopher GLEMOT

CTO | Technical specialist around Data Management, Security, Cyber Security, Cyber Resilience, Backup, Disaster Recovery, Multi-Cloud, and Storage | Veeam Vanguard | Varonis Elite | Owner of original-network.com

Most commented posts

  1. Step by Step Guide Veeam Agent for Windows — 41 comments
  2. Step by Step Guide Veeam B&R 9.5 Upgrade (v9 to v9.5) — 27 comments
  3. Veeam Availability Suite 9.5 first full availability solution! — 23 comments
  4. VeeamON New Orleans – Veeam Availability Suite 10 – Some new features announced! — 19 comments
  5. Script to disable UAC Server on Windows Server 2016 — 18 comments

Author's posts

Important Vulnerability in VMware ESXi

There is currently an encryption campaign targeting ESXi servers up to version 7.x via the CVE-2022-31696 vulnerability, which allows access to data on host systems.  

Continue reading

Advertisement

Enterprise Cybersecurity challenges in 2023

In 2022, a lot of new variants of ransomware and groups (Ransomware as a Service) have targeted several major organizations and enterprises. New techniques (new features introduced by the notorious “LockBit” group, and a newcomer, “Play” that employs self-propagation techniques) and groups emerged as targeted ransomware attacks double in 2022. Today’s organizations, no matter their …

Continue reading

Advertisement

Kerberos Authentication with Veeam v12

Kerberos Authentication with Veeam v12. NTLM authentication is still mandatory for communication between all Veeam infrastructure servers in v11. However, NTLM authentication is still required for communication between Veeam backup infrastructure servers (backup server, backup proxies, backup repositories, guest interaction proxies, log shipping servers, and mount servers). NTLM was subject to several known security vulnerabilities …

Continue reading

Advertisement

Critical Fortigate VPN SSL Vulnerability – CVE-2022-42475

Updated on Tuesday 13, December – Affected versions. Critical VPN SSL Vulnerability (FortiOS): Fortinet has just announced a critical vulnerability in all versions. Vulnerabilities that can be easily exploited remotely to compromise firewall or where remote code execution is considered likely in common situations. Manipulate the dynamic resources of some processes, the goal is to …

Continue reading

Hackers love it when you post pictures of your work environment

Hackers love it when you post pictures of your work environment! We are all proud of what we are doing and proud of the great companies we are working in. But by taking pictures of your work environment for LinkedIn or your career blog you are unintentionally disclosing information about your technical setup. This is …

Continue reading

error

Enjoy this blog? Please spread the word :)