Barracuda Email Security Gateway Customers at Risk and Must Act Immediately!


Hackers are exploiting an un-patchable vulnerability (CVE-2023–2868) in Barracuda Email Security Gateway appliances. Barracuda has announced that customers should discontinue using the email security product or upgrade. Hackers are using multiple types of malware to remotely gain control and undermine the confidentiality of victims email!

Here is a short (5min) video where I cover the #cybersecurity highlights and what customers need to do immediately!

See the Barracuda site for more details: https://www.barracuda.com/company/legal/esg-vulnerability

Like and subscribe!

Follow me on LinkedIn https://www.linkedin.com/in/matthewrosenquist

Learn about the most pervasive cybersecurity mistakes in the LinkedIn Learning Course: “Five Biggest Mistakes of Cybersecurity Programs” https://www.linkedin.com/learning/five-biggest-mistakes-of-cybersecurity-programs/learn-from-others-mistakes

Posted with STEMGeeks



0
0
0.000
1 comments
avatar

This already paid-out post was just upvoted by @ultimus.
This post was created to allow this voter the oportunity to still upvote this content IF (s)he deems this content to be high quality.
Please don't use this post to self-upvote. You will get blacklisted if you do. And don't use it to upvote low quality content

This is a hive-archeology proxy comment meant as a proxy for upvoting good content that is past it's initial pay-out window.

image.png

Pay-out for this comment is configured as followed:

roleaccountpercentagenote
curator-0.0%curation rewards disabled
dev@croupierbot2.5%author of hive-archology
dev@emrebeyler2.5%author of lighthive
author@mrosenquist95.0%
0
0
0.000