Browsing Posts in vSecurity

Reading Time: 2 minutesSpectre and Meltdown bugs seems something from the past (my last blog post was about some Meltdown and Spectre variants). But of course that’s not true… we have only start to stratch the attack surface of CPU. Now there are additional chapters of Spectre saga.

Reading Time: 5 minutesVeeam has just released a new build for Veeam Backup & Replication 12.3.1.1139. You can check the installed build number in the Veeam Backup & Replication Console’s Main Menu (≡) under Help > About. The first reason of this release if to fix the CVE-2025-23120 issue: a vulnerability allowing remote code execution (RCE) by authenticated domain users. This issue is critical and has a CVSS v3.1 Score  of 9.9!

Reading Time: 5 minutesCybersecurity is a focal point of enterprises and governments globally. The longstanding approach of protecting critical data via firewalls or using segregated/dedicated networks is no longer sufficient! This also includes Fibre Channel (FC) SAN where security was historically considered intrinsic in the SAN, due to the usage of fiber cables and dedicated (and isolated) fabrics.

Reading Time: 4 minutesThe Veeam Hardened Repository ISO (VHRISO) is a Managed Hardened Repository delivered as bootable ISO with a Rocky Linux distribution preconfigured by Veeam. The idea is to dramatically simplify the provisioning experience while eliminating (or at least reducing) the need for any Linux expertise. But also have an OS pre-hardened out of the box with all advanced security settings already applied. This because immutability may be not enough if you configure your repository in a wrong way! Recommendations are based on Security Technical Implementation Guides (STIGs) created and maintained by the Defense Information Systems Agency (DISA) for Rocky Linux. […]

Reading Time: 3 minutesWith Veeam Backup & Replication 12.3, the malware detection methods have been improved compared with 12.1 version. The different malware detection methods are similar, they work in different way and can be used together to reach different scopes, but now there are more options. As previous, the first main diffecence is that some works inline (during the backup process on the source data) and other works with a post-processing directly on restore points saved on the repositories. They provide different type of results.

Reading Time: 8 minutesThe Veeam Managed Hardened Repository is a bootable ISO based on Rocky Linux 9.2 (Blue Onyx) distribution preconfigured by Veeam. The idea is to dramatically simplify the provisioning experience and improve the security of the hardened repository, with a solutionpre-hardened out of the box with all advanced security settings already applied. This because immutability may be not enough if you configure your repository in a wrong way!

Reading Time: 5 minutesThe Veeam Hardened Repository ISO (VHRISO) is a Managed Hardened Repository delivered as bootable ISO with a Rocky Linux distribution preconfigured by Veeam. The idea is to dramatically simplify the provisioning experience while eliminating (or at least reducing) the need for any Linux expertise. But also have an OS pre-hardened out of the box with all advanced security settings already applied. This because immutability may be not enough if you configure your repository in a wrong way! Recommendations are based on Security Technical Implementation Guides (STIGs) created and maintained by the Defense Information Systems Agency […]

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright