Tag: Veeam

Detection & Response to Ransomware with Veeam

Learn how Veeam helps customers and partners detect and respond to ransomware with Veeam B&R and Veeam One. This blog post covers reports and alerts that can be leveraged if ransomware strikes. With insights for VBR, as well as VMware vSphere and Microsoft Hyper‑V, Veeam ONE delivers deep, intelligent monitoring, reporting and automation through interactive …

Continue reading

Advertisement

Offline versus Immutable Backups

An air-gap or offline is a way of isolating your critical data by separating a copy either physically (removing the tape out of the drive) or not accessible from the network ( network ports or routes disabled). An immutable backup is a copy of data that has role-based access controls and other types of authentications …

Continue reading

Advertisement

Cuba ransomware and Veeam CVE-2023-27532

We continue to read that Cuba Ransomware attacks Veeam Backup servers that are unpatched, unmaintained, or outdated. The Cuba ransomware group is exploiting a bug in data backup software exposed in March, warn security experts. It’s even been claimed that they have added a new set of tools to their arsenal along with CVE-2023-27532, the …

Continue reading

Advertisement

Veeam User Group Day in Monaco

Hi, I hope that you had a lovely summer holiday and wanted to thank everyone who has already registered for the first Veeam User Group in France (September 14, 2023)! To those who haven´t done it yet, the form will be open for the rest of 3 next weeks, so I hope each of you …

Continue reading

High Veeam Backup & Replication Vulnerability – CVE-2023-27532

Today, Veeam has released patches for Veeam Backup & Replication v11 and v12. A critical vulnerability (CVSSv3 7.5 – CVE-2023-27532) has been fixed and you should apply the patch as soon as possible. Unauthorized users may be able to request encrypted credentials from the Veeam Backup service, and therefore get access to the backup infrastructure. …

Continue reading

error

Enjoy this blog? Please spread the word :)