Veeam Blog
Filters (Results: 24)
Results: 24
Filters (Results: 24)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Obscura Ransomware: A Case Study in Ransomware Data Loss

“If you pay a ransom, will you get your files back?" It’s a ubiquitous question that the majority of security blogs and vendor surveys fail to answer correctly. A quick search online will yield a dozen contradictory statistics. Why is this such a difficult question to answer? The truth is outcome statistics vary dramatically from case to case, and broad averages are useless for making real time, critical decisions. Read more
Bill Siegel
Bill Siegel

CEO & Co-founder of Coveware

Akira Exploits the Gaps Between Patching and Identity Security

Coveware by Veeam experts have observed a sharp rise in Akira ransomware cases, with more than 40 of those incidents tied to a single exploitation pathway. At the center of these cases is a recently mitigated VPN vulnerability in widely deployed enterprise appliances, which Akira has been actively exploiting to gain initial access. What makes this surge particularly concerning is that many of the victim organizations had already applied the vendor’s patch. Read more
Raymond Umerley
Raymond Umerley

Field CISO

Dangerous Tools in Clumsy Hands: Lessons from the VanHelsing Ransomware Leak

For many organizations, this is the nightmare scenario: you think you’ve negotiated your way out of a ransomware attack, you’ve paid the ransom demanded, and you’ve waited for the promised decryption tool. But when you think your data is safe and the ordeal is finished, you discover your data is still lost. Read more

Cyber Resilience Strategies: From Risk to Resilience Report

Ransomware attacks are evolving faster than ever, making cyber resilience a top priority for organizations of all sizes. In this post, our principal product marketing manager, Leah Troscianecki, EMEA field CTO, Edwin Weijdema, and VP of information security, Courtney Elder, answer some of the main questions from Veeam’s Risk to Resilience Report, share real-world insights from the front lines, and offer actionable best practices to help your business prepare for and recover from cyber incidents. Read more
Leah Troscianecki
Leah Troscianecki

Product Marketing Manager, Cloud Product Marketing

The Organizational Structure of Ransomware Threat Actor Groups is Evolving Before Our Eyes

As we approach the one year anniversary of two prominent ransomware group collapses (Lockbit and BlackCat/ALPHV), we find the ransomware ecosystem to be as fractured and uncertain as it did in the months following these events. The Ransomware-as-a-Service (RaaS) model remains irreversibly tarnished after the groups that pioneered this framework were exposed as being fraught with infighting, deception, lost profits, and compromised anonymity for their affiliates. Joint law enforcement actions over the last year have systematically impaired the resources ransomware actors depend on to operate. In the case of domestic threats, law enforcement efforts have even put a number of bad actors behind bars. While certain groups persist and new names continue to trickle in and out of the ransom-sphere, ... Read more
Bill Siegel
Bill Siegel

CEO & Co-founder of Coveware

Key Innovations and Data Resilience Highlights from VeeamON 2025 

With over 60 sessions and more than 100 speakers, VeeamON 2025 was a resounding success. We’re thrilled you joined us — whether in San Diego or virtually — to continue to learn the transformative potential of data resilience. During three action-packed days, we introduced significant new products and features, presented groundbreaking research on ransomware protection and the state of data resilience, and much more. Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Recon Scanner Detects Malicious Activity & Prevents Cyberattack

Local governments, just like any private organization, rely heavily on digital infrastructure for nearly every aspect of operation — from managing tax systems to safeguarding financial records and online services. This reliance however added to restricted IT and security budgets makes them prime targets for cyberattacks. Read more