Xopero Blog

T-Mobile second 2020 data leak / Google Docs not so private…

Welcome to the next episode of the Xopero Security Center – the first one in 2021! But let’s make a small step back first and take a look at some of the most interesting news from the last week. Google has patched a bug in its feedback tool incorporated across its services which allowed attackers to see your private Google Docs documents. T-Mobile also got some problems – a second data leak in 2020, but this time from the CPNI system. And the last one… Cybersecurity specialists spotted a new multi-platform malware that transforms Windows and Linux servers into Monero miners. More details can be found below.

Read more

SolarWinds backdoor got a kill switch – there is still about 18k potential victims

SolarWinds backdoor and connected with it a recent supply-chain attack are one of the biggest cyber incidents we have witnessed in years. The compromised software channel was used to push out malicious updates onto 18,000 of their Orion platform customers. There is a new development in this case. Security specialists turned a malicious domain name used to control potentially thousands of computer systems into a kill switch. How it was done exactly? Well… check the newest episode of Xopero Security Center to find out more.

Read more

How to set up Microsoft 365 backup policies

As users in your organization work on their projects, they generate more and more data you probably want to protect. Microsoft provides a few tools to prevent data loss. One of these is Microsoft 365 backup policies. In this article, we will take a closer look at Microsoft 365 backup policies explaining how to set them up or how they can be used to reduce the probability of Microsoft 365 data loss. Let’s start!

Read more

New Microsoft Teams flaw is a big security concern – then what has gone wrong, Microsoft?

The nature of the flaw in Microsoft Teams allows performing an attack in which the recipient of a message does not need to perform any sort of action – exploitation will occur just by reading it. And what comes as a real surprise is a fact that the zero-click remote code execution vulnerability did not receive a CVE. Considering how many companies rely on MS Teams as a collaboration software, it is extremely important that organizations prioritize patching this vulnerability. And not giving it a CVE sends a bad message.

Read more

How to build a comprehensive backup strategy for your company

We as humans live in a very dangerous world, full of unexpected risks. Now imagine a world, where danger hides around every corner, you can’t make any mistake, otherwise, you are gone. In the world, I just described, live all of your company data. You can influence this world by providing your data with adequate protection. The First step is creating a comprehensive backup strategy. In this article, I will guide you through points you have to have in mind while creating your organization’s backup strategy.

Read more