Blog

Cloud-based ransomware attacks

Microsoft wrote a blogpost of their own recently discussing shifts in tactics employed by Storm-0501, a notorious ransomware gang – increasingly, a shift towards Cloud-based ransomware attacks. What’s changed? Over time, Storm-0501 has evolved their attack plans – expanding from simple on-premises to targeting hybrid systems (environments...
by Matúš Koronthály

Backups – not just for businesses

Archiving and data backups for businesses are the main topic we have circled around on this blog, especially since more and more regulations outright require it – elevating...
by Matúš Koronthály

WinRAR Zero-Day Attack

A zero-day attack on WinRAR was disclosed last week. The vulnerability, tracked as CVE-2025-8088, affects all Windows versions of WinRAR up to 7.12. Users of the ubiquitous...
by Matúš Koronthály

Reviewing data retention and deletion

We’ve written on the topic of data retention and deletion before, but it’s a good idea to revisit the information again. Given the amount of data that businesses collect,...
by Matúš Koronthály

Reviewing E-Discovery

What is eDiscovery, and what effects does it have on your business? These are questions that all companies in the current business environment should have a ready answer to. As...
by Matúš Koronthály

Data on the Cloud – Migration and Management

Cloud adoption continues to climb, showing despite the already staggering numbers and rising challenges that the Cloud is nowhere near market saturation yet. This naturally leads...
by Matúš Koronthály

DORA still presenting challenges

The vast majority of financial services firms across Europe believe themselves to be unable to meet the full business resiliency requirements of the EU’s Digital Operational...
by Matúš Koronthály

Data handling and protection updates

As we go into mid-summer and Q3 2025, it’s time to take another moment to catch up on the updates regarding data handling and protection. Let’s see what the newest information...
by Matúš Koronthály

Protecting backups for cyber resilience

More companies are beginning to understand the need for establishing backups and other systems for managing their data and establishing recovery. At the same time, there’s a...
by Matúš Koronthály

Microsoft finally ends Remote PowerShell protocol

As was signaled long in advance, Microsoft is finally making a move to axe both Remote PowerShell protocol (RPS) and other legacy authentication methods. An alert in the Microsoft...
by Matúš Koronthály

Backups on and off the Cloud

According to Flexera’s 2025 State of the Cloud report, 70% of all businesses employ a hybrid cloud or multicloud strategy, something we have also written about previously....
by Matúš Koronthály

EU Data Act 2025 coming soon

The EU Data Act 2025 is coming soon, slated to be effective from September 2025. Joining an already long list of data regulations, the Data Act promises to further develop the...
by Matúš Koronthály

Top disaster recovery tips and methods

Disaster recovery is a word to conjure with in business circles. As reported in Arcserve’s 2022 report, 76% of companies report losing business critical data. The ability to...
by Matúš Koronthály

DELL unveils AI cybersecurity features

DELL has recently released the details on their newest cybersecurity and data storage options. These include several features that look promising in early detection of system...
by Matúš Koronthály

LockBit ransomware gang hacked

In a strange reversal, the LockBit ransomware gang has suffered a data breach after its dark web affiliate panels were defaced last week. The defacement message matches the one...
by Matúš Koronthály

New options for long-term storage on the horizon

A tech startup, Cerabyte, has made waves in the data storage industry by revealing their plans for a new storage medium. If the medium pans out, it promises new options for long...
by Matúš Koronthály

Vulnerability in Azure Found

Varonis Threat Labs identified a Destructive Stored URL Parameter Injection vulnerability in the Azure portal, which has since been patched by Microsoft. The vulnerability in...
by Matúš Koronthály

A look at optimizing data storage

An organized office with papers carefully filed into the correct cabinets has been long accepted as a key to success – but many organizations have neglected to transpose these...
by Matúš Koronthály

AI adoption drives data increases

AI is one of the key words in the current online environment and has been for several years now; from the growth of LLMs and other generative AI to the spread of AI-powered tools,...
by Matúš Koronthály