Barracuda Email Security Gateway Customers at Risk and Must Act Immediately!
Hackers are exploiting an un-patchable vulnerability (CVE-2023–2868) in Barracuda Email Security Gateway appliances. Barracuda has announced that customers should discontinue using the email security product or upgrade. Hackers are using multiple types of malware to remotely gain control and undermine the confidentiality of victims email!
Here is a short (5min) video where I cover the #cybersecurity highlights and what customers need to do immediately!
See the Barracuda site for more details: https://www.barracuda.com/company/legal/esg-vulnerability
Like and subscribe!
Follow me on LinkedIn https://www.linkedin.com/in/matthewrosenquist
Learn about the most pervasive cybersecurity mistakes in the LinkedIn Learning Course: “Five Biggest Mistakes of Cybersecurity Programs” https://www.linkedin.com/learning/five-biggest-mistakes-of-cybersecurity-programs/learn-from-others-mistakes
Posted with STEMGeeks
This already paid-out post was just upvoted by @ultimus.
This post was created to allow this voter the oportunity to still upvote this content IF (s)he deems this content to be high quality.
Please don't use this post to self-upvote. You will get blacklisted if you do. And don't use it to upvote low quality content
This is a hive-archeology proxy comment meant as a proxy for upvoting good content that is past it's initial pay-out window.
Pay-out for this comment is configured as followed: