101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

506
active users

#commvault

0 posts0 participants0 posts today
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Commvault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Commvault</span></a> says recent breach didn't impact customer backup data</p><p><a href="https://www.bleepingcomputer.com/news/security/commvault-says-recent-breach-didnt-impact-customer-backup-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/commvault-says-recent-breach-didnt-impact-customer-backup-data/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> tags <a href="https://mastodon.thenewoil.org/tags/Broadcom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Broadcom</span></a> <a href="https://mastodon.thenewoil.org/tags/FabricOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FabricOS</span></a>, <a href="https://mastodon.thenewoil.org/tags/CommVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CommVault</span></a> flaws as exploited in attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-tags-broadcom-fabric-os-commvault-flaws-as-exploited-in-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisa-tags-broadcom-fabric-os-commvault-flaws-as-exploited-in-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Brian Greenberg :verified:<p>⚠️ Cyber threat: Max-severity Commvault bug enables unauthenticated remote code execution 💥🛠️</p><p>CVE-2025-34028 is a newly disclosed vulnerability in Commvault’s Command Center (versions 11.38.0 to 11.38.19):<br>🔓 Allows unauthenticated SSRF-based exploitation<br>💻 Leads to full RCE on both Windows and Linux<br>🚫 No authentication required<br>🛡️ Fix issued in 11.38.20</p><p>This is a high-value target — Commvault often controls backup infrastructure and critical data repositories.</p><p>✅ Mitigation steps:<br>• Apply patch 11.38.20 immediately<br>• Isolate backup interfaces from public access<br>• Monitor for abnormal command execution or data exfiltration</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Commvault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Commvault</span></a> <a href="https://infosec.exchange/tags/DataSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataSecurity</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://infosec.exchange/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityManagement</span></a><br><a href="https://www.darkreading.com/cyber-risk/max-severity-commvault-bug-researchers" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/cyber-risk/max</span><span class="invisible">-severity-commvault-bug-researchers</span></a></p>