Tag: backup
-
Cybersouveränität ist das neue Geschäftsmodell für digitale Vertrauenswürdigkeit
Cybersouveränität wird zur Vorstandsagenda: Nicht Regulierung, sondern die veränderte Natur von Daten (Cloud, Echtzeit-Replikation, KI) macht Souveränität zum zentralen Hebel für digitale Vertrauenswürdigkeit. »Kontrolle« ist oft nur eine Illusion: Region-Settings, Verschlüsselung und Backups reichen nicht, wenn Policy-Steuerung, Key-Ownership und Recovery-Prozesse nicht transparent und unter Realbedingungen getestet sind. Resilienz = nachweisbare Wiederherstellbarkeit: Prävention bleibt Pflicht ……
-
Lessons from the PocketOS Incident: When AI Agents Go Beyond Their Limits
The reported PocketOS incident, in which an AI agent deleted a live production database and its backups in a matter of seconds, has quickly become a defining moment in the conversation around autonomous systems in enterprise environments. An AI-powered coding or operations agent, operating with legitimate access via API tokens, encountered what it interpreted as…
-
Microsoft Windows 11 April 2026 Security Update Disrupts Third-Party Backup Tools
The April 2026 security update for Windows 11, designated as KB5083769, is causing severe disruptions for users relying on third-party backup solutions. Deployed for Windows 11 versions 24H2 and 25H2, this patch introduces a critical flaw that breaks the Microsoft Volume Shadow Copy Service (VSS). Because VSS is a fundamental component for taking safe, point-in-time…
-
April KB5083769 Windows 11 update causes backup software failures
The April 2026 KB5083769 security update breaks third-party backup applications from multiple vendors on systems running Windows 11 24H2 and 25H2. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/april-kb5083769-windows-11-update-causes-backup-software-failures/
-
Proxmox Backup Server 4.2 arrives with S3 storage support and parallel sync jobs
Proxmox Backup Server 4.2 is a maintenance and feature update built on Debian 13.4 >>Trixie<< that adds S3-compatible object storage as a supported backend and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/30/proxmox-backup-server-4-2-released/
-
Cursor AI Agent Wipes PocketOS Database and Backups in 9 Seconds
PocketOS founder says Cursor AI agent deleted its production database in 9 seconds after misusing a root API token, exposing major Railway security flaws. First seen on hackread.com Jump to article: hackread.com/cursor-ai-agent-wipes-pocketos-database-backups/
-
WhatsApp Tests Encrypted Cloud Backup Service for Safer Message Storage
WhatsApp is actively developing an independent, first-party cloud backup service featuring mandatory end-to-end encryption. This upcoming feature aims to reduce users’ reliance on third-party storage providers such as Google Drive and Apple’s iCloud. By bringing backup storage in-house, WhatsApp gives users greater control over their data privacy and device storage limits. All chat histories hosted…
-
Claude Opus 4.6-Powered AI Coding Agent Wipes Production Database in 9 Seconds
A Claude Opus 4.6-powered AI coding agent operating through the Cursor editor autonomously deleted the production database and backups of SaaS startup PocketOS in just nine seconds. The incident highlights critical security failures in AI guardrails and infrastructure access controls. The Nine-Second Data Breach Jer Crane, founder of automotive software platform PocketOS, reported that the…
-
3 practical ways AI threat detection improves enterprise cyber resilience
Legitimate admin activity and malicious behavior often look similar without contextHybrid environments generate fragmented telemetry that rule sets can’t correlateLean teams don’t have time to manually connect the dots across systemsPlatforms like Adlumin MDR apply behavioral models and automated triage to suppress low”‘value alerts and elevate incidents that actually matter. Fewer alerts, better context, and…
-
3 practical ways AI threat detection improves enterprise cyber resilience
Legitimate admin activity and malicious behavior often look similar without contextHybrid environments generate fragmented telemetry that rule sets can’t correlateLean teams don’t have time to manually connect the dots across systemsPlatforms like Adlumin MDR apply behavioral models and automated triage to suppress low”‘value alerts and elevate incidents that actually matter. Fewer alerts, better context, and…
-
Unveränderliche Backup-Speicherlösungen – Die ideale Verteidigung gegen KI-gestützte Angriffe
First seen on security-insider.de Jump to article: www.security-insider.de/die-ideale-verteidigung-gegen-ki-gestuetzte-angriffe-a-0feda47f8aab3b849c42f92823dd19ce/
-
The backup myth that is putting businesses at risk
Backups protect data, but don’t keep your business running during downtime. Datto shows why BCDR is essential to keep operations running during ransomware and outages. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/the-backup-myth-that-is-putting-businesses-at-risk/
-
NAKIVO v11.2: Ransomware Defense, Faster Replication, vSphere 9, and Proxmox VE 9.0 Support
NAKIVO Inc. announced the general availability of NAKIVO Backup & Replication v11.2, focused on fast, reliable, and proactive data protection. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/nakivo-v112-ransomware-defense-faster-replication-vsphere-9-and-proxmox-ve-90-support/
-
4 questions to ask before outsourcing MDR
2. Can your team separate real threats from noise?: Alert fatigue is one of the biggest barriers to effective security. Tools generate volumes of signals, but not all alerts represent real risk. When everything looks critical, teams either burn out or miss the alerts that matter most.MDR helps by applying human expertise and threat intelligence…
-
5 trends defining the future of AI-powered cybersecurity
Tags: ai, automation, backup, breach, business, cloud, compliance, cyber, cybersecurity, data, defense, detection, endpoint, framework, government, metric, monitoring, msp, regulation, resilience, threatSee how AI is altering the landscape in the new N-able and Futurum report, Cybersecurity in the Age of AI: Moving from Fragile to Resilient. Get key insights on building a modern framework for business resilience. 2. From perimeter security to continuous cyber resilience: The “castle and moat” approach is obsolete. In a world of…
-
Ausfallsicherheit für Cloud-Regionen – Digitale Souveränität auch für Backups und Notfallpläne
First seen on security-insider.de Jump to article: www.security-insider.de/digitale-souveraenitaet-auch-fuer-backups-und-notfallplaene-a-f94074dc884c0c97444fc906f555deb0/
-
Mehrstufiger Resilienzansatz – Backup ist nur Schritt eins sichere Recovery macht den Unterschied
Tags: backupFirst seen on security-insider.de Jump to article: www.security-insider.de/backup-ist-nur-schritt-eins-sichere-recovery-macht-den-unterschied-a-aa4931709183ed3d28b3bb3c0eaf79f5/
-
WhatsApp’s “EndEnd Encryption by Default” Claim Called Consumer Fraud by Pavel Durov
Telegram founder Pavel Durov has publicly criticized WhatsApp, labeling its >>end-to-end encryption by default<< claim as a massive consumer fraud. He argues that while messages may be encrypted during transit, the default backup settings leave the vast majority of user conversations completely unprotected. In a recent statement on the social media platform X, Durov highlighted…
-
Breach of Confidence: 10 April 2026
I spent most of one day this week trying to access a perfectly ordinary online service and felt like I was applying for witness protection. By the end of it, I’d supplied a password, a code, a backup code, a second email, and what felt like several pieces of emotional verification. We are constantly told……
-
What to Know About CyberAv3ngers: The IRGC-Linked Group Targeting Critical Infrastructure
Tags: access, advisory, ai, attack, authentication, automation, backup, cctv, chatgpt, cisa, communications, compliance, control, credentials, crypto, cve, cyber, cybersecurity, data, data-breach, defense, detection, dns, email, exploit, finance, firewall, flaw, government, group, healthcare, infrastructure, intelligence, international, Internet, iot, iran, kev, leak, linux, malicious, malware, mitigation, mitre, monitoring, network, office, openai, password, radius, resilience, risk, router, service, siem, software, strategy, switch, technology, threat, tool, update, vpn, vulnerability, vulnerability-managementAn Iran-affiliated threat group has evolved from defacing water utility displays to deploying custom ICS malware and exploiting Rockwell Automation PLCs across multiple U.S. critical infrastructure sectors. Key takeaways: CyberAv3ngers is a state-directed threat group operating under Iran’s IRGC Cyber-Electronic Command. The U.S. Treasury sanctioned six named officials in February 2024 and the State Department…
-
Hackhire group caught targeting Android devices and iCloud backups
Security researchers exposed a spying campaign by a hack-for-hire group that used Android spyware and phishing to steal iCloud credentials and hack victims’ devices. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/08/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups/
-
Passport numbers for more than 300,000 leaked during December Eurail data breach
In February, a hacker claimed the attack and said they stole 1.3 TB of data that included source code, database backups and Zendesk support tickets. First seen on therecord.media Jump to article: therecord.media/eurail-reports-data-breach-impacting-over-300000
-
DORA in der Praxis – Wie die isländische RB Bank ihre Backup- und Security-Architektur modernisiert
First seen on security-insider.de Jump to article: www.security-insider.de/wie-die-islaendische-rb-bank-ihre-backup-und-security-architektur-modernisiert-a-946af1e02f2ef1ad19c7674cf16e1764/
-
Fortinet releases emergency hotfix for FortiClient EMS zero-day flaw
Mitigation and response: In addition to the hotfix, organizations should review their available logs for any suspicious API requests and activity. Unfortunately, there are no published indicators of compromise for this malicious activity yet, so watchTowr recommends auditing all recent changes made to endpoint security policies, VPN configuration profiles, application firewall rules, administrator accounts and…
-
5 steps to strengthen supply chain security and improve cyber resilience
Tags: access, api, attack, authentication, automation, backup, breach, business, cloud, control, credentials, cyber, data, defense, detection, dns, edr, email, endpoint, exploit, framework, governance, identity, infrastructure, mfa, monitoring, msp, network, radius, resilience, risk, saas, service, siem, soc, software, strategy, supply-chain, threat, tool, update, vulnerability, zero-trustAll software vendors and SaaS platformsOpen”‘source components embedded in your applicationsMSP or IT service providersCloud infrastructure and authentication servicesAPI integrations and automation workflowsOnce documented, classify each supplier by the impact they would have if compromised. A remote monitoring tool or authentication platform represents far greater risk than a basic productivity app. This prioritization helps you…
-
5 steps to strengthen supply chain security and improve cyber resilience
Tags: access, api, attack, authentication, automation, backup, breach, business, cloud, control, credentials, cyber, data, defense, detection, dns, edr, email, endpoint, exploit, framework, governance, identity, infrastructure, mfa, monitoring, msp, network, radius, resilience, risk, saas, service, siem, soc, software, strategy, supply-chain, threat, tool, update, vulnerability, zero-trustAll software vendors and SaaS platformsOpen”‘source components embedded in your applicationsMSP or IT service providersCloud infrastructure and authentication servicesAPI integrations and automation workflowsOnce documented, classify each supplier by the impact they would have if compromised. A remote monitoring tool or authentication platform represents far greater risk than a basic productivity app. This prioritization helps you…
-
The Value of Immutability with Object First
IT security teams today must have the feeling of a target on their back. It is not paranoia. Hackers target backup storage in nearly every single ransomware incident because they know that if they kill your safety net, you are likely to pay up. I have seen too many smart admins lose sleep wondering if..…

