Tag: backup
-
Critical remote code execution flaw patched in Veeam backup servers
Tags: backup, cve, exploit, flaw, framework, programming, rce, remote-code-execution, risk, update, veeam, vulnerabilityWhy black lists are bad: Application developers have gotten in the habit of mitigating deserialization risks by creating blacklists of classes that could be dangerous when deserialized, and as watchTowr explains, this was also Veeam’s approach when addressing CVE-2024-40711. However, history has shown that blacklists are rarely complete.”Blacklists (also known as block-lists or deny-lists) are…
-
Veeam RCE bug lets domain users hack backup servers, patch now
Veeam has patched a critical remote code execution vulnerability tracked as CVE-2025-23120 in its Backup & Replication software that impacts domain-joined installations. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/veeam-rce-bug-lets-domain-users-hack-backup-servers-patch-now/
-
CISA tags NAKIVO backup flaw as actively exploited in attacks
CISA has warned U.S. federal agencies to secure their networks against attacks exploiting a high-severity vulnerability in NAKIVO’s Backup & Replication software. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-tags-nakivo-backup-flaw-as-actively-exploited-in-attacks/
-
Veeam patches critical 9.9 flaw in backup and replication product
First seen on scworld.com Jump to article: www.scworld.com/news/veeam-patches-critical-99-flaw-in-backup-and-replication-product
-
Veeam fixed critical Backup Replication flaw CVE-2025-23120
Veeam released security patches for a critical Backup & Replication vulnerability that could let attackers remotely execute code. Veeam addressed a critical security vulnerability, tracked as CVE-2025-23120 (CVSS score of 9.9), impacting its Backup & Replication software that could lead to remote code execution. The vulnerability impacts 12.3.0.310 and all earlier version 12 builds, it was…
-
Veeam Update Patches Critical Backup Software Vulnerability
‘Real Danger’ Alert for Unpatched Veeam Servers Attached to a Production Domain. Widely used Veeam Backup & Replication software has been patched to fix a critical vulnerability that could be abused to remotely exploit malicious code. Security experts recommend rapid patching, given ransomware and other groups’ repeated targeting of the software. First seen on govinfosecurity.com…
-
CISA Warns of Exploited Nakivo Vulnerability
CISA has added an absolute path traversal bug in Nakivo Backup and Replication to its Known Exploited Vulnerabilities list. The post CISA Warns of Exploited Nakivo Vulnerability appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/cisa-warns-of-exploited-nakivo-vulnerability/
-
CVE-2024-48248: High-Severity NAKIVO Flaw Actively Exploited
The U.S. Cybersecurity and Infrastructure Security Agency has identified a significant security flaw affecting NAKIVO Backup Replication software, adding it to its Known Exploited Vulnerabilities (KEV) catalog due to active exploitation in the wild. The vulnerability, tracked as CVE-2024-48248… First seen on sensorstechforum.com Jump to article: sensorstechforum.com/nakivo-backup-software-flaw-exploited/
-
Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems
Veeam has released security updates to address a critical security flaw impacting its Backup & Replication software that could lead to remote code execution.The vulnerability, tracked as CVE-2025-23120, carries a CVSS score of 9.9 out of 10.0. It affects 12.3.0.310 and all earlier version 12 builds.”A vulnerability allowing remote code execution (RCE) by authenticated domain…
-
Veeam Patches Critical Vulnerability in Backup Replication
Veeam has released patches for a critical-severity remote code execution vulnerability in Backup Replication. The post Veeam Patches Critical Vulnerability in Backup Replication appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/veeam-patches-critical-vulnerability-in-backup-replication/
-
Critical Veeam Backup Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120)
Veeam has released fixes for a critical remote code execution vulnerability (CVE-2025-23120) affecting its enterprise Veeam Backup Replication solution, and is urging … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/20/critical-veeam-backup-replication-rce-vulnerability-cve-2025-23120/
-
CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw impacting NAKIVO Backup & Replication software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.The vulnerability in question is CVE-2024-48248 (CVSS score: 8.6), an absolute path traversal bug that could allow an unauthenticated attacker to First seen on…
-
CISA Warns of NAKIVO Backup Flaw Exploited in Attacks with PoC Released
Tags: attack, backup, cisa, cve, cyber, cybersecurity, exploit, flaw, infrastructure, software, vulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious vulnerability in the NAKIVO Backup and Replication software, known as CVE-2024-48248. This vulnerability allows attackers to exploit an absolute path traversal flaw, enabling them to read arbitrary files without authentication. The vulnerability resides in the Director Web Interface of the…
-
Critical Veeam Backup Replication Vulnerability Allows Remote Execution of Malicious Code
Tags: backup, cve, cvss, cyber, malicious, remote-code-execution, risk, software, veeam, vulnerabilityA critical vulnerability in Veeam Backup & Replication software has been disclosed, posing a significant risk to users. This vulnerability, identified as CVE-2025-23120, allows remote code execution (RCE) by authenticated domain users. The severity of this issue is underscored by a CVSS v3.1 score of 9.9, indicating a high level of risk. The vulnerability has…
-
Veeam Backup Replication RCE-Schwachstelle CVE-2025-23120
Nutzer von Veeam Backup & Replication müssen reagieren. Der Anbieter Veeam hat zum 19. März 2025 über eine Remote Code Execution (RCE) Schwachstelle CVE-2025-23120 in verschiedenen Versionen des genannten Produkts informiert. Es gibt Sicherheitsupdates, um diese Schwachstelle zu schließen. Die … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/03/19/veeam-backup-replication-rce-schwachstelle-cve-2025-23120/
-
Cyberversicherung: Mehr als ein Backup
Deutsche Unternehmen werden fast wöchentlich Ziel eines Cyberangriffs und trotz steigender IT-Ausgaben sind viele Firmen nicht auf den Ernstfall vorbereitet. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cloud-security/cyberversicherung-backup
-
Druva expands backup services to Microsoft Azure
First seen on scworld.com Jump to article: www.scworld.com/brief/druva-expands-backup-services-to-microsoft-azure
-
Hacker legen Verwaltung in Kirkel lahm
Das Rathaus in Kirkel ist aufgrund eines Cyberangriffs geschlossen. www.kirkel.deWie der Saarländische Rundfunk (SR) berichtet, entdeckte die IT-Abteilung der Gemeindeverwaltung Kirkel am vergangenen Freitag (14. März) einen Sicherheitsvorfall. Demnach musste das ganze System neu aufgesetzt werden. Der Wiederaufbau sei noch nicht abgeschlossen, heißt es.Das Rathaus bleibt deshalb bis auf unbestimmte Zeit geschlossen. Auch E-Mails werden…
-
NIST Announces HQC as Fifth Standardized Post Quantum Algorithm
First choices for both KEMs and DSAs are already standardized, and organizations should not wait for the backups to be available before migrating to PQC. The post NIST Announces HQC as Fifth Standardized Post Quantum Algorithm appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/nist-announces-hqc-as-fifth-standardized-post-quantum-algorithm/
-
UK Cybersecurity Weekly News Roundup 16 March 2025
Tags: access, apple, attack, backdoor, backup, compliance, control, cyber, cyberattack, cybercrime, cybersecurity, data, encryption, finance, firewall, government, group, hacking, insurance, law, lockbit, malicious, network, office, privacy, ransomware, regulation, risk, russia, service, software, virusWelcome to this week’s edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. UK Government’s Stance on Encryption Raises Global Concerns The UK government has ordered Apple to provide backdoor access to iCloud users’ encrypted backups under the Investigatory Powers Act of 2016. This secret order…
-
Sicherheit für Unternehmensdaten, Teil 2 – Storage-Security: Backup-Verfahren und -Schutz
Tags: backupFirst seen on security-insider.de Jump to article: www.security-insider.de/storage-security-backup-verfahren-und-schutz-a-3ae253150f6a762cec02d9bf3ee8d3de/
-
Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: NIST selects HQC as backup algorithm for post-quantum encryption Last year, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/16/week-in-review-nist-selects-hqc-for-post-quantum-encryption-10-classic-cybersecurity-books/
-
Report on ransomware attacks on Fortinet firewalls also reveals possible defenses
Tags: access, attack, authentication, automation, backdoor, backup, ciso, control, credentials, cve, cybercrime, data, data-breach, defense, exploit, firewall, fortinet, group, infrastructure, Internet, lockbit, malicious, monitoring, network, password, radius, ransom, ransomware, risk, router, tactics, threat, tool, update, vpn, vulnerability, windowsSigns of intrusion: “This actor exhibits a distinct operational signature that blends elements of opportunistic attacks with ties to the LockBit ecosystem,” Forescout said in its analysis.”Mora_001’s relationship to the broader Lockbit’s ransomware operations underscores the increased complexity of the modern ransomware landscape where specialized teams collaborate to leverage complementary capabilities.”CISOs should note these consistent…
-
The most notorious and damaging ransomware of all time
Tags: access, android, attack, backdoor, backup, banking, botnet, breach, communications, computer, control, credentials, cryptography, cyber, cybercrime, dark-web, data, defense, detection, email, encryption, endpoint, exploit, extortion, finance, flaw, framework, germany, google, government, group, hacker, hacking, healthcare, infection, infrastructure, international, jobs, korea, law, lazarus, leak, linux, malicious, malware, microsoft, mobile, msp, network, north-korea, office, open-source, oracle, password, phishing, phone, powershell, ransom, ransomware, russia, service, software, spam, switch, technology, threat, tool, ukraine, update, usa, virus, vulnerability, windowsConti: History: First appearing in May 2020, the Conti RaaS platform is considered the successor to the Ryuk ransomware. As of January 2021, Conti is believed to have infected over 150 organizations and earned millions of dollars for its criminal developers and their affiliates. At least three new versions have been found since its inception.How it works: Conti uses the…
-
6 wichtige Punkte für Ihren Incident Response Plan
Tags: backup, business, ceo, ciso, compliance, cyber, cyberattack, cybersecurity, cyersecurity, finance, incident response, mail, ransomware, risk, security-incident, service, strategy, supply-chain, updateLesen Sie, welche Schritte für Ihren Notfallplan besonders wichtig sind.Wenn ein Unternehmen einen größeren Ausfall seiner IT-Systeme erlebt beispielsweise aufgrund eines Cyberangriffs ist es zu diesem Zeitpunkt nicht mehr voll geschäftsfähig. Deshalb ist ein effektiver Plan zur Reaktion auf Vorfälle (Incident Response, IR) unerlässlich.Es geht jedoch nicht nur darum, die Quelle eines Angriffs zu finden…
-
The state of ransomware: Fragmented but still potent despite takedowns
Tags: ai, alphv, antivirus, attack, backup, cloud, control, cyber, cybercrime, cybersecurity, data, ddos, detection, endpoint, extortion, firewall, group, incident response, intelligence, law, leak, LLM, lockbit, malware, network, ransom, ransomware, service, software, tactics, threat, tool, usa, zero-trustRunners and riders on the rise: Smaller, more agile ransomware groups like Lynx (INC rebrand), RansomHub (a LockBit sub-group), and Akira filled the void after major takedowns, collectively accounting for 54% of observed attacks, according to a study by managed detection and response firm Huntress.RansomHub RaaS has quickly risen in prominence by absorbing displaced operators…
-
NIST selects HQC as backup algorithm for post-quantum encryption
Last year, NIST standardized a set of encryption algorithms that can keep data secure from a cyberattack by a future quantum computer. Now, NIST has selected a backup … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/12/nist-hqc-post-quantum-encryption-algorithm/
-
Lessons from the Field, Part III: Why Backups Alone Won’t Save You
James Keiser, Director of Secured Managed Services Southeast, CISO Global, Inc. It’s been a while since I’ve put some thoughts together for the CISO Blog, and with World Backup Day coming at the end of this month, the timing felt right. I’ve mentioned in the past that backups are crucial to keeping your data preserved……
-
Commvault Webserver Vulnerability Poses Cybersecurity Risk, Urging Immediate Action
Commvault, a leading provider of data protection and management solutions, has recently addressed a critical flaw affecting its webserver software. This Webserver vulnerability, if left unchecked, could have allowed attackers to gain full control over systems running affected versions of Commvault’s software. The flaw impacts both Linux and Windows platforms, posing a substantial risk to…

