Last week, Veritas released a set of advisories for security flaws in various versions of BackupExec. This flaw, a buffer overflow in the BackupExec remote agent, is apparently being attacked in the wild. InformationWeek reported yesterday that the vuln is already being actively attacked by a W32.Toxbot variant. If you’re running BackupExec, make sure you get the patch, and don’t allow remote traffic to TCP port 10000 (not that you should normally be doing that anyway, but still…)
