Attacchi ransomware Alessandro Stesi

Acronis Cyber Cloud Active Protection: Racconto di due attacchi di ransomware

Attacchi ransomware

Attacchi ransomware

Con il ransomware che prende oggi di mira i backup, le soluzioni di backup tradizionali mettono a rischio le aspettative legate alla business continuity e creano un falso senso di sicurezza. Oggi i responsabili devono adottare una soluzione di nuova generazione per bloccare le minacce prima che possano causare danni irreversibili, come il fallimento.

Le informazioni presentate riguardano diverse gravi criticità che i clienti si trovano ad affrontare e coinvolge i clienti potenziali sui seguenti temi:

  1. 1)  le attuali sfide della protezione dei dati business-critical;

  2. 2)  il modo in cui Acronis Backup protegge tutti i dati e i backup integrando tecnologie avanzate ad ogni opportunità, attestandosi come la soluzione più sicura sul mercato.

Pubblico di destinazione

  ♦ CIO e CTO cercano una soluzione di backup completa dal prezzo competitivo

  ♦ Specialisti IT che devono eseguire il backup di crescenti quantità di dati su più piattaforme

  ♦ Aziende di ogni dimensione che sono alla ricerca di software di backup facile da usare ma completo

 

Scopo

Istruire i clienti sul ransomware e su come si posizionano le soluzioni di backup legacy rispetto alle soluzioni Acronis.

 

Infografica

Parlare di ransomware è un ottimo modo per iniziare a parlare di Acronis Backup e di Acronis Active Protection.

L’infografica di seguito riporta argomenti a favore della scelta di una soluzione di backup in grado di proteggere attivamente gli ambienti IT dalla minaccia crescente della criminalità informatica.

Acronis Ransomware Infographic_IT

[btnsx id=”2929″]

 

Articoli correlati:

Acronis Disaster Recovery Cloud

Alternativa al NAS

7 motivi per NON rinnovare un backup tradizionale

GDPR: che cosa c’e’ di nuovo e cosa c’e’ di vecchio

 

 

Condividi


RSS

Piu’ articoli…

Categorie …

Tags

RSS CSIRT

RSS Dark Reading

RSS Full Disclosure

  • [RT-SA-2021-001] Cross-Site Scripting in myfactory.FMS Ottobre 13, 2021
    Posted by RedTeam Pentesting GmbH on Oct 13Advisory: Cross-Site Scripting in myfactory.FMS During a penetration test, a reflected cross-site scripting vulnerability (XSS) was found in the myfactory.FMS login form. If a user opens an attacker-prepared link to the application, attackers can run arbitrary JavaScript code in the user's browser. Details ======= Product: myfactory.FMS Affected Versions:
  • [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045) Ottobre 6, 2021
    Posted by bashis on Oct 05[STX] Subject: [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045) Attack vector: Remote Authentication: Anonymous (no credentials needed) Researcher: bashis (2021) Limited Disclosure: September 6, 2021 Full Disclosure: October 6, 2021 PoC: https://github.com/mcw0/DahuaConsole -=[Dahua]=- Advisory: https://www.dahuasecurity.com/support/cybersecurity/details/957 Firmware:...
  • Backdoor.Win32.Prorat.lkt / Port Bounce Scan (MITM) Ottobre 6, 2021
    Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/dec8f9042986d64e29d62effb482290b_B.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Prorat.lkt Vulnerability: Port Bounce Scan (MITM) Description: The ProSpy Server V1.9 malware runs an FTP component that listens on TCP port 2121. Third-party attackers who successfully logon can abuse the backdoor […]
  • Backdoor.Win32.Prorat.lkt / Weak Hardcoded Password Ottobre 6, 2021
    Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/dec8f9042986d64e29d62effb482290b.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Prorat.lkt Vulnerability: Weak Hardcoded Password Description: The ProSpy Server V1.9 malware runs an FTP component that listens on TCP port 2121. The FTP server requires authentication for remote user access. However, […]
  • HackTool.Win32.Agent.gi / Local Stack Buffer Overflow (SEH) Ottobre 6, 2021
    Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/e60606d19a36789662ba97b4bb5c4ccf.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: HackTool.Win32.Agent.gi Vulnerability: Local Stack Buffer Overflow (SEH) Description: The Hack Office 2000 malware doesnt check bounds when loading textfiles for the wordlist to perform website URL cracking. Loading a specially crafted […]
  • Trojan-PSW.Win32.PdPinch.gen / Remote Denial of Service Ottobre 6, 2021
    Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/0e4fbfeb6f7a98e437a497013b285ffc.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan-PSW.Win32.PdPinch.gen Vulnerability: Remote Denial of Service Description: The malware listens on TCP port 1212. Third-party attackers who can reach infected systems can send a specially crafted junk HTTP request to trigger […]
  • Backdoor.Win32.Hupigon.gy / Unauthenticated Open Proxy Ottobre 6, 2021
    Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/be74cbb86c007309d8004d910f5270f7.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.gy Vulnerability: Unauthenticated Open Proxy Description: The malware listens on TCP ports 8080, 1080. Third-party attackers who can connect to the infected system can relay requests from the original connection to […]
  • Backdoor.Win32.Bifrose.ahyg / Insecure Permissions Ottobre 6, 2021
    Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/d6aff119c03ff378d386b30b36b07a69.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Bifrose.ahyg Vulnerability: Insecure Permissions Description: The malware creates an dir with insecure permissions under c:\ drive granting change (C) permissions to the authenticated user group. Standard users can rename the...
  • HEUR.Trojan.Win32.Generic / Insecure Service Path Ottobre 6, 2021
    Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/2e4b6c5bd907995f6fd40c5eeab5c6e9.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: HEUR.Trojan.Win32.Generic Vulnerability: Insecure Service Path Description: The malware creates a service with an unquoted path. Third party attackers who can place an arbitrary executable under c:\ drive can potentially undermine the […]
  • Backdoor.Win32.Yoddos.an / Insecure Service Path Ottobre 6, 2021
    Posted by malvuln on Oct 05Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/bf2417bf23a3b7ae2e44676882b4b9dd.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Yoddos.an Vulnerability: Insecure Service Path Description: The malware creates a service with an unquoted path. Third party attackers who can place an arbitrary executable under c:\ drive can potentially undermine the […]

Customers

Newsletter