Vulnerabilities impacting multiple QNAP operating systems (CVE-2022-27597, CVE-2022-27598)

Two vulnerabilities affecting various QNAP operating systems (CVE-2022-27597 and CVE-2022-27598) have been uncovered by Sternum. These vulnerabilities enable authenticated remote users to access secret values, requiring owners to take immediate action … Continue reading Vulnerabilities impacting multiple QNAP operating systems (CVE-2022-27597, CVE-2022-27598)

Leveraging network automation to enhance network security

Data backups get a lot of attention, but sadly, sometimes, the operational work that keeps networks secure – like device backups, upgrades, and configuration grooming – goes undone. Recent high-profile network outages have brought attention to the impo… Continue reading Leveraging network automation to enhance network security

Top 5 security risks for enterprise storage, backup devices

An average enterprise storage and backup device has 14 vulnerabilities, three of which are high or critical risk that could present a significant compromise if exploited, according to Continuity. The findings underscore a significant gap in the state o… Continue reading Top 5 security risks for enterprise storage, backup devices

Veeam Backup & Replication admins, get patching! (CVE-2023-27532)

Veeam Software has patched CVE-2023-27532, a high-severity security hole in its widely-used Veeam Backup & Replication solution, and is urging customer to implement the fix as soon as possible. About CVE-2023-27532 The nature of CVE-2023-27532 has… Continue reading Veeam Backup & Replication admins, get patching! (CVE-2023-27532)

Attackers are searching for online store backups in public folders. Can they find yours?

Too many online store administrators are storing private backups in public folders and exposing database passwords, secret API keys, administrator URLs and customer data to attackers who know where to look. “Exposed secrets have been used to gain… Continue reading Attackers are searching for online store backups in public folders. Can they find yours?