Backups vulnerable

Backups of all your important information and systems, resilient to attack, is an essential part of any incident response and business continuity plan. So anything that could impact that back-up must be a priority to solve. So if you use Veeam back-up you need a conversation: Hackers target vulnerable Veeam …

Exploited Vulnerabilities

The US government Cybersecurity and Infrastructure Security Agency (CISA) has added TP-Link, Apache and Oracle vulnerabilities to the Known Exploited Vulnerabilities Catalog. CISA Adds Three Known Exploited Vulnerabilities to Catalog | CISA