If you’re using any software running on Apache and Java, be aware of this critical zero-day vulnerability. Log4j is a ubiquitous logging tool included in almost every Java application, meaning this vulnerability affects literally millions of servers. The Log4J library vulnerability (CVE-2021-44228) allows an attacker to cause the target system to fetch and execute code …
Category: Data Protection
Nov 02
Defending Against Crypto-Ransomware with Netwrix
Hi, today we will discuss about data governance and more especially a software called: Netwrix Auditor. Netwrix Auditor is a visibility and governance platform that enables control over changes, configurations, and access in hybrid cloud IT environments to protect unstructured data regardless of its location. The platform provides security analytics to detect anomalies in user …
Oct 19
Conti initiates their attacks on Backup
Cyber groups (cartels) specifically target backup solutions in order to ensure that the victim has no other option except for paying the ransom. Conti group is particularly methodical in developing and implementing backup removal techniques (on-premise and cloud). The full analysis is available here (thanks to ADV INTEL) and is based on their actual proactive …
Oct 18
Backup with Trusted Repository Storage
Backup with trusted repository storage is essential (secure, reliable and efficient). Here’s a fresh example of data loss issues Veeam is seeing in support (Anton Gostev’s Weekly Word) from users who chose “low-end” NAS as their backup storage. What makes this one worth highlighting here is the usage of NFS protocol, which removes all those …
Oct 14
[REPLAY] Arrow and Veeam Talk Show 2021
Hi! Thank you for coming in a great number last week to Arrow Talk Show event focused on Cloud and Digital Transformation. I had the opportunity to participate in a live show in French with Veeam Software, Arrow and, Aviti, talking about: Cloud, Digital Transformation, Data Protection and Security. Watch the recording of the live …

