Unauthenticated users can gain access to a network operating Veeam within the backup infrastructure network perimeter and obtain encrypted credentials stored in the configuration database, according to the vendor.
WHY IT MATTERS
After an increasing number of cyberattacks exploiting a Veeam…
Source: www.healthcareitnews.com – Read more

North Korean Hackers Use ZIP Files to Deploy Malicious PowerShell Scripts
North Korean state-sponsored hackers, known as APT37 or ScarCruft, are leveraging malicious ZIP files in phishing emails to start multi-stage cyber attacks. The malicious files,