Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Veeam Screams: Urgent Updates Needed to Patch Critical Security Flaws
Update Veeam Backup Enterprise Manager now! A critical security flaw (CVE-2024-29849) allows attackers to bypass authentication. With a CVSS score of 9.8, this vulnerability is no joke. Patch up to the latest version to stay safe.

Hot Take:
If your backup software is feeling more like a Swiss cheese than a security fortress, it’s time to patch. Veeam’s latest vulnerabilities are a stark reminder that even your backups need backups!
Key Points:
- Veeam Backup Enterprise Manager has a critical security flaw (CVE-2024-29849) with a CVSS score of 9.8.
- Three other vulnerabilities (CVE-2024-29850, CVE-2024-29851, and CVE-2024-29852) also affect the same product.
- All issues are fixed in version 12.1.2.172, but deployment of the Manager is optional.
- Additional vulnerabilities have been fixed in Veeam Agent for Windows and Veeam Service Provider Console.
- Previous exploits by threat actors like FIN7 and Cuba underline the urgency of these updates.