PoC for critical Arcserve UDP vulnerabilities published (CVE-2024-0799, CVE-2024-0800)

Arcserve has fixed critical security vulnerabilities (CVE-2024-0799, CVE-2024-0800) in its Unified Data Protection (UDP) solution that can be chained to upload malicious files to the underlying Windows system. Tenable researchers have published a PoC e… Continue reading PoC for critical Arcserve UDP vulnerabilities published (CVE-2024-0799, CVE-2024-0800)

How teams can improve incident recovery time to minimize damages

With breach recovery costs skyrocketing, speeding time to recovery to minimize downtime and losses should be top of mind for security leaders. Yet, most focus on adding more prevention and detection tools. In this Help Net Security video, Nick Scozzaro… Continue reading How teams can improve incident recovery time to minimize damages

Active Directory Backup vs Replication (And Why You Need to Be Clear on the Difference Now)

Backup and replication are common data protection concepts, but they serve different purposes. Learn more about their differences and how they can benefit your data management strategy, especially how the backup vs replication argument relates to Active Directory (AD) and protecting it. What are backup and replication? Although backup and replication are both methods of…

The post Active Directory Backup vs Replication (And Why You Need to Be Clear on the Difference Now) appeared first on Petri IT Knowledgebase.

Continue reading Active Directory Backup vs Replication (And Why You Need to Be Clear on the Difference Now)

Active Directory outages can cost organizations $100,000 per day

Nearly every organization has core systems services tied to Active Directory that will go down during an outage, according to Cayosoft. Consequences of system downtime for business operations The impact of just one system being down can devastate busin… Continue reading Active Directory outages can cost organizations $100,000 per day

Top 5 Features to Look for in On-Premises Veeam Storage

In this article, we’ll examine some of the main challenges of today’s backup and disaster recovery procedures. Then, we’ll dive into the top five most important features to look for in an on-premises Veeam storage solution for your backups. Data protection is one of the most critical tasks for IT administrators, and there is no…

The post Top 5 Features to Look for in On-Premises Veeam Storage appeared first on Petri IT Knowledgebase.

Continue reading Top 5 Features to Look for in On-Premises Veeam Storage

Free ransomware recovery tool White Phoenix now has a web version

White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested on BlackCat/ALPHV Ransomware, Play Ransomware, Qilin/Agenda Ransomware, BianLian Ransomware, and DarkBit. Intermittent… Continue reading Free ransomware recovery tool White Phoenix now has a web version

Windows Server Backup: A Step-by-Step Guide

How familiar are you with Windows Server Backup? You may be surprised by its value in your organization. I’ll explain what its main purpose is and how to use it to back up an Active Directory domain controller and fileservers. What is Windows Server Backup? Windows Server has had a built-in backup application since Windows…

The post Windows Server Backup: A Step-by-Step Guide appeared first on Petri IT Knowledgebase.

Continue reading Windows Server Backup: A Step-by-Step Guide

PoCs for critical Arcserve UDP vulnerabilities released

Arcserve has fixed critical security vulnerabilities (CVE-2023-41998, CVE-2023-41999, CVE-2023-42000) in its Unified Data Protection (UDP) solution, PoCs for which have been published by Tenable researchers on Monday. The vulnerabilities Arcserve UDP i… Continue reading PoCs for critical Arcserve UDP vulnerabilities released

The dangers of dual ransomware attacks

At some point in the movie “Groundhog Day,” Phil Connors breaks his bedside radio when he is woken up (yet again) by the song “I Got You Babe”. This déjà vu seems to await companies that fall victim to ransomware and fail to orchestrate the proper resp… Continue reading The dangers of dual ransomware attacks

Companies scramble to integrate immediate recovery into ransomware plans

More than one-third of companies still do not have a well-rounded, holistic ransomware strategy in place, according to Zerto. Immediate recovery crucial for businesses’ survival The survey also found that companies are reevaluating their data pro… Continue reading Companies scramble to integrate immediate recovery into ransomware plans