Browse our collection of latest insights, essential new research, and practical tips.
Hackers are exploiting two recent vulnerabilities on MinIO, an Amazon S3 cloud storage service, to breach object storage systems and access private information, execute arbitrary code, and potentially
A known ransomware gang – knows as Cuba – is exploiting a high-severity vulnerability in Veeam to deploy malware to their targets and steal login credentials.
The US Cybersecurity and Infrastructure Security Agency (CISA) warns that a recently patched critical vulnerability CVE-2023-27992 affecting network-attached storage (NAS) products made by Zyxel has been
Attackers are successful in debilitating their victims’ ability to recover in 75% of those events, reinforcing the criticality of security posture management to ensure backup repositories
The assailants gained access to the Windows domain controllers, encrypting VMware ESXi servers and backups, causing a massive outage… Dish has since been slapped with multiple class-action lawsuits alleging their poor cybersecurity and IT infrastructure.
The threat actors behind RTM Locker have developed a ransomware strain that’s capable of targeting Linux machines, infecting NAS and ESXi Hosts
The high-severity vulnerability was first published in March 2023. It enables an unauthenticated user who has accessed the Veeam backup network perimeter to get their hands
Newly discovered “By-Design” flaw in Microsoft Azure could expose storage accounts to Hackers
U.S. Cybersecurity and Infrastructure Security Agency (CISA) increased its list of security issues that threat actors have used in attacks, three of them in Veritas Backup Exec exploited to deploy ransomware.
The security breach appears to have been linked to ransomware, but so far, no major ransomware group has claimed responsibility for the attack.
Veeam this week announced patches for a severe vulnerability in its Backup & Replication solution. CVE-2023-27532 allows an unauthenticated user to request encrypted credentials
GoTo (formerly LogMeIn) is warning customers that threat actors stole encrypted backups containing customer information and an encryption key for a portion of that data. GoTo chief executive Paddy Srinivasan confirmed the security breach was far worse than originally reported.
Several threat actors were seen advertising the fully weaponized tool to exploit several critical and high-severity vulnerabilities affecting Veeam
Noberus ransomware affiliates Noberus (also known as BlackCat, ALPHV) are using data-stealing malware to steal passwords held by Veeam backup software. This is being used by the Colonial Pipeline ransomware group.
The storage solutions of HPE and NetApp are also affected by these vulnerabilities
Any attacker with control over the system can read, modify and potentially destroy the entire virtual backup tapes, which could be used as an initial stage
More than 1,000 QNAP devices have been infected with the Deadbolt ransomware in the last week
The security holes could be exploited to execute code remotely, without authentication.
Users of QNAP network-attached storage (NAS) devices are reporting attacks on their systems with the eCh0raix ransomware, also known as QNAPCrypt.
Western Digital had updated its SanDisk SecureAccess product to address vulnerabilities that can be exploited to gain access to user data.
Cyber attackers are making a ‘beeline’ for backup servers to disable or corrupt files.
The Conti ransomware gang has developed novel tactics to demolish backups, especially the Veeam recovery software.
Synology has warned customers that the StealthWorker botnet is targeting their network-attached storage (NAS) devices.
“If you can’t access backup, you aren’t going to be able to restore files and you’re more likely to pay the ransom.”
Ransomware attacks are proving more lucrative for cyber criminals as even organizations that can restore from backups are paying ransom demands.
Don’t wait for a ransomware attack to expose backup flaws. These eight steps will put you on the path for reliable data restores.
Get in touch to see how you can detect, prioritize, and fix all security risks in your storage & backup systems.