Category: Security

Critical OpenSSL Vulnerability version 3.0

Updated (October 27th, 2022): List of vendors and software affected by the OpenSSL vulnerability here. Critical OpenSSL Vulnerability version 3.0 and above: OpenSSL has just announced a critical vulnerability in version 3.x. This access vulnerability requires access to private keys and/or risks remote machine access (RCE). Vulnerabilities that can be easily exploited remotely to compromise …

Continue reading

Advertisement

Veeam v12 Linux Without SSH And SUDO

In Veeam B&R v11, Veeam introduced the ability to build your own immutable (Veeam Immutable Backup), hardened backup repositories on Linux. In the upcoming Veeam Availability Suite v12 release, Veeam announced some new features. Here’s a blog post about Linux permissions management in v12.

Continue reading

Advertisement

Ransomware & Cybersecurity with Veeam v12

Cyber groups (Ransom Cartels), specifically target backup solutions in order to ensure that the victim has no other option except for paying the ransom. Conti group (works like a Ransom Cartel) is particularly methodical in developing and implementing backup removal techniques (on-premise and cloud). The full analysis is available here and is based on their …

Continue reading

Advertisement

Top 3 Most Viewed Posts in 2021

Hello, Many thanks for your visit in 2021, we wish you all the best for the New Year 2022 to all of the loyal readers of Original-Network.com! Hope you have the energy and the element of good fortune we will all need to ensure a successful to the new year and a prosperous future beyond …

Continue reading

[PODCAST] Veeam User Group France #1

Hi! Thank you for coming in a great number 3 weeks ago to Veeam User Group France #1 event focused on Backup Architectures secure by design and Security. I had the opportunity to participate in a live podcast in French with Yoann Castillo (Team Lead Systems Engineering @Veeam), and Eric Machabert (CISO & CTO @Maincare …

Continue reading

error

Enjoy this blog? Please spread the word :)