Backup as a Service

ICT_Disaster_Recovery_Plan Piergiorgio Venuti

Disaster Recovery Plan: Safeguarding the Future of Your Company

Today’s digital world is a dynamic and constantly evolving environment, where security and operational continuity represent not only a need, but a true imperative for companies of all sizes and sectors. In this context, a well-structured Disaster Recovery (DR) Plan is essential to ensure resilience and rapid response in the event of unexpected events and IT disasters. In this article,…

Giacomo Lanzi

Ransomware and NAS: a risk that is not considered

Despite some seasonal declines, ransomware is still a serious security threat, especially for those who underestimate it . It is often thought that to protect yourself from ransomware it is enough to have a backup copy of your data. This point of view does not take into consideration various aspects. One of them is the relationship between ransomware and NAS…

Evitare il Ransomware Cover Giacomo Lanzi

Avoid Ransomware: That’s why it’s best not to take any risks

ransomware gangs have been targeting businesses in recent times, demanding larger payments than they can extort from consumers. The plan was very successful. According to the new data, 70% of the attacked companies paid the ransom to get their data back. Avoiding ransomware is a necessity, these figures implicitly prove it. If such a large number of companies pay, it…

Ransomware a doppia estorsione Cover Giacomo Lanzi

Double extortion ransomware: What they are and how to defend yourself

Looking to up the ante and earn more money with the ransomware , i Cybercriminals are increasingly using a tactic known as double extortion ransomware . Not only do they encrypt data and demand a ransom from the victim to regain access. They also threaten to upload them online if their conditions are not met. Let’s take a step back,…

I Ransomware più pericolosi Giacomo Lanzi

The most dangerous Ransomware in 2020

The ransomware (or cyber extortion) threat is on the rise. In 2020, there was a spike in the number of reported incidents and the number of hackers attempting to extort money from organizations. It is important that every organization does all it can to combat these criminals and being informed is a key element. In this article we see the…

Ransomware e Acronis Active Protection Giacomo Lanzi

Acronis Active Protection: defense against ransomware

Acronis Active Protection is an advanced anti-ransomware technology. It actively protects all the data on your systems: documents, data of all kinds and Acronis backup files. It is a technology available for Windows and Mac OS X operating systems and protects against the latest ransomware actions such as Petya, WannaCry, Locky and Osiris. What is Ransomware? Ransomware is a particularly…

Soluzioni Corporate di backup Alessandro Stesi

Corporate backup solutions Self-protection tests

Introduction Corporate backup solutions: In light of the growing number of ransomware attacks in which cryptolockers stop database processes to unlock database files for encryption (Cerber, GlobeImposter, Rapid, Serpent) and they can encrypt local and network backups to request a ransom payment (Rapid, Spora), we decided to test the self-protection capabilities of the best backup solutions used in the corporate…

Acronis Cyber Cloud Alessandro Stesi

[Name change] Acronis Data Cloud –> Acronis Cyber Cloud

As you know, Acronis Data Cloud will receive a host of essential new enhancements (like backup for G Suite and cryptomining protection) and be renamed Acronis Cyber Cloud in just a few weeks.   Acronis Cyber Cloud: distinguishes our data protection solution because it speaks to the customer’s weaknesses.   ♦ Offering next-gen data protection – cyber protection – meets…

Alessandro Stesi

Modern Data Protection: The Difference is in the Cloud

Modern Data Protection How to Completely Safeguard Businesses – with Ease Simplify is often a valuable mantra of success. Yet in a complex and ever-evolving IT environment, it isn’t necessarily the go-to approach for service providers. In the case of data protection, simplification may not only seem unlikely, but potentially unwise. Fortunately, certain innovative cloud technologies now make it simple…

Subscription Alessandro Stesi

Subscription business model – Basics

subscription Subscription is a convenient way to receive updates, products or services on a regular and ongoing basis. This business model has stood the test of time. Over the years, satisfied customers have used regular services by subscribing news, magazines, CDs, wine and even opera tickets. And then the cloud arrived. The cloud has made IT complex easy and cheap,…

Backup Piergiorgio Venuti

New Acronis Cloud Backup model for end users and new reseller plan

New Acronis Cloud Backup model for end users and new reseller plan   Our Acronis Cloud Backup service is renewed with two distinct subscription types for end users and retailers / system integrators. With the former, it is possible to meet the needs of small and medium businesses that need to have a professional solution for managing their local and…

ACRONIS CLOUD BACKUP SYSTEM INTEGRATOR Piergiorgio Venuti

A Hybrid Cloud Backup Solution for System Integrator and reseller

ACRONIS CLOUD BACKUP SYSTEM INTEGRATOR Thousands of system integrator — from small to large — succeed by selling an award- winning backup-as-a-service solution that supports more than 20 platforms. Acronis Cloud Backup protects any virtual, physical, and cloud environment, and lets you quickly realise incremental revenues with zero upfront costs and a pay-as-you-go business model. PROTECT ANY WORKLOAD, BACKUP TO ANY STORAGE…

NAS Piergiorgio Venuti

Alternative to the NAS

NAS Network Attached Storage (NAS) is a great low-cost tool for storing your data like backups (single files / folders or entire operating system images). Thanks to its connection (ethernet or wifi) with the local network (LAN) it is possible to easily copy the contents from your PC or server to the NAS using manual and / or automatic systems….

acronis-newsletter2 Piergiorgio Venuti

Stay in control of your fast-moving, quick-shifting data

At the breakneck speed of business, it can be easy to lose control of your data as it races between your physical and virtual servers, PCs and mobile devices, and private and public clouds. And as every racing fan knows, speed is paramount, but speed without control can be disastrous. [btnsx id=”5010″] With better control, you can more safely manage…

VCSP Piergiorgio Venuti

7 motivi per NON rinnovare un backup tradizionale

Veeam Availability Ogni giorno sempre più clienti dei backup tradizionali passano a Veeam®. Perché? Perché le tecnologie progettate per l’era client-server non possono offrire l’Availability 24.7.365 di cui necessitano le aziende moderne, né la capacità di ripristinare in pochi minuti o secondi qualsiasi servizio IT in esecuzione nel cloud ibrido. [bg_collapse view=”button-blue” color=”#ffffff” icon=”eye” expand_text=”Maggiori informazioni” collapse_text=”Mostra meno” ] La sostituzione…

Veeam Backup Remote Access Piergiorgio Venuti

Remote access for MSPs in Veeam Backup & Replication 9.5 Update 2

Veeam Backup Remote Access. We are happy to announce that the RTM build of Veeam Backup & Replication 9.5 Update 2 is now read up and running on Veeam Cloud Connect service! This is the latest update for our flagship product and adds support for the upcoming release of Veeam Agent for Microsoft Windows 2.0 along with other significant enhancements…

Backup as a Service Piergiorgio Venuti

Two ways to implement your BaaS (Backup as a Service)

BaaS (Backup as a Service) is the service that allows your company to save a copy (off-site copy) of data in Cloud. In this way, you can store your information in a safe place and then restore it at any time in case of disaster.BaaS is one of the ways to implement backup 3-2-1 rule. Secure Online Desktop provides its…

Veeam 2017 Availability Report Piergiorgio Venuti

BaaS with Veeam Cloud Connect

Veeam 2017 Availability Report 3 Steps To Avoid $21.8M In Downtime Costs [btnsx id=”4150″] Examining the real world impacts when service Availability goals are not met. Veeam® commissioned ESG to survey over 1,000 global IT decision makers to better understand the protection, recovery, and Availability challenges they are facing today. Overall results were surprising – demonstrating a startling amount of…

Share


RSS

More Articles…

Categories …

Tags

RSS Unknown Feed

RSS Full Disclosure

  • KL-001-2025-016: Xorux LPAR2RRD File Upload Directory Traversal July 28, 2025
    Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28KL-001-2025-016: Xorux LPAR2RRD File Upload Directory Traversal Title: Xorux LPAR2RRD File Upload Directory Traversal Advisory ID: KL-001-2025-016 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-016.txt 1. Vulnerability Details      Affected Vendor: Xorux      Affected Product: LPAR2RRD      Affected Version: 8.04 and prior      Platform: Rocky Linux 8.10      CWE...
  • KL-001-2025-015: Xorux LPAR2RRD Read Only User Log Download Exposing Sensitive Information July 28, 2025
    Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28KL-001-2025-015: Xorux LPAR2RRD Read Only User Log Download Exposing Sensitive Information Title: Xorux LPAR2RRD Read Only User Log Download Exposing Sensitive Information Advisory ID: KL-001-2025-015 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-015.txt 1. Vulnerability Details      Affected Vendor: Xorux      Affected Product: LPAR2RRD      Affected Version: 8.04 and […]
  • KL-001-2025-014: Xorux LPAR2RRD Read Only User Denial of Service July 28, 2025
    Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28KL-001-2025-014: Xorux LPAR2RRD Read Only User Denial of Service Title: Xorux LPAR2RRD Read Only User Denial of Service Advisory ID: KL-001-2025-014 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-014.txt 1. Vulnerability Details      Affected Vendor: Xorux      Affected Product: LPAR2RRD      Affected Version: 8.04 and prior      Platform: Rocky […]
  • KL-001-2025-013: Xorux XorMon-NG Web Application Privilege Escalation to Administrator July 28, 2025
    Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28KL-001-2025-013: Xorux XorMon-NG Web Application Privilege Escalation to Administrator Title: Xorux XorMon-NG Web Application Privilege Escalation to Administrator Advisory ID: KL-001-2025-013 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-013.txt 1. Vulnerability Details      Affected Vendor: Xorux      Affected Product: XorMon-NG      Affected Version: 1.8 and prior...
  • KL-001-2025-012: Xorux XorMon-NG Read Only User Export Device Configuration Exposing Sensitive Information July 28, 2025
    Posted by KoreLogic Disclosures via Fulldisclosure on Jul 28KL-001-2025-012: Xorux XorMon-NG Read Only User Export Device Configuration Exposing Sensitive Information Title: Xorux XorMon-NG Read Only User Export Device Configuration Exposing Sensitive Information Advisory ID: KL-001-2025-012 Publication Date: 2025-07-28 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-012.txt 1. Vulnerability Details      Affected Vendor: Xorux      Affected Product: XorMon-NG     ...
  • Multiple vulnerabilities in the web management interface of Intelbras routers July 20, 2025
    Posted by Gabriel Augusto Vaz de Lima via Fulldisclosure on Jul 19=====[Tempest Security Intelligence]========================================== Multiple vulnerabilities in the web management interface of Intelbras routers Author: Gabriel Lima =====[Table of Contents]====================================================== 1. Overview 2. Detailed description 3. Other contexts & solutions 4. Acknowledgements 5. Timeline 6. References =====[1....
  • Missing Critical Security Headers in OpenBlow July 13, 2025
    Posted by Tifa Lockhart via Fulldisclosure on Jul 12Advisory ID: OPENBLOW-2025-003 Title: Missing Critical Security Headers in OpenBlow Date: 2025-07-12 Vendor: OpenBlow (openblow.it) Severity: High CVSS v3.1 Base Score: 8.2 (High) Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N Summary: Multiple public deployments of the OpenBlow whistleblowing software lack critical HTTP security headers. These configurations expose users to client-side vulnerabilities including […]
  • SAP NetWeaver S/4HANA - ABAP Code Execution via Internal Function July 11, 2025
    Posted by Office nullFaktor GmbH on Jul 11nullFaktor Security Advisory < 20250719 > =========================================================== Title: ABAP Code Execution via Internal Function Module WRITE_AND_CALL_DBPROG Vulnerability: Exposed Dangerous Functionality Product: SAP NetWeaver S/4HANA Homepage: http://www.sap.com Affected Version: S/4HANA, SAP_BASIS 757 SP 3 SAP Note: 3546011 Impact: High...
  • Tiki Wiki CMS Groupware <= 28.3 Two Server-Side Template Injection Vulnerabilities July 10, 2025
    Posted by Egidio Romano on Jul 09---------------------------------------------------------------------------------- Tiki Wiki CMS Groupware
  • KL-001-2025-011: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Server-Side Request Forgery July 9, 2025
    Posted by KoreLogic Disclosures via Fulldisclosure on Jul 09KL-001-2025-011: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Server-Side Request Forgery Title: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Server-Side Request Forgery Advisory ID: KL-001-2025-011 Publication Date: 2025-07-09 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-011.txt 1. Vulnerability Details      Affected Vendor: Schneider Electric      Affected...

Customers

Newsletter

{subscription_form_1}