Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Patch Now or Pay Later: Acronis Warns of Critical Security Flaw Exploited in the Wild
Acronis warned customers to patch a critical Cyber Infrastructure security flaw. The vulnerability, tracked as CVE-2023-45249, allows unauthenticated attackers to bypass authentication using default credentials. Over 20,000 service providers use Acronis Cyber Protect to secure 750,000 businesses. Admins are urged to update their servers immediately…

Hot Take:
When Acronis says, “We’ve got your back(up),” they might mean it literally. Just make sure you patch that critical flaw before the hackers decide to party in your server room!
Key Points:
- Acronis alerts customers about a critical flaw (CVE-2023-45249) in its Cyber Infrastructure platform.
- The vulnerability, allowing attackers to bypass authentication, impacts multiple ACI builds.
- Over 20,000 service providers and 750,000 businesses across 150 countries are potentially at risk.
- The flaw was patched nine months ago, but exploits have been detected in the wild.
- Acronis strongly advises updating to the latest build immediately to ensure security.