BLOG POSTS

Akira: A Threat Profile

Akira: A Threat Profile

Aliases Akira is the only known alias. Associated with other groups known as Storm-1567, Howling Scorpius, Punk Spider, and Gold Sahara Get Threat Intel and Security Updates Delivered to Your Inbox. Profiling Threat Actor Type:...

Fire Ant: A Threat Profile

Fire Ant: A Threat Profile

Aliases Fire Ant China‑nexus infrastructure espionage actor (media shorthand) UNC3886‑overlap (tooling/TTP overlap; not a formal attribution) Listed by MITRE as an alias for Mustang Panda (G0129)   Profiling Threat Actor Type:...

The CISO’s Guide to Preemptive Hypervisor Security in 2026

The CISO’s Guide to Preemptive Hypervisor Security in 2026

As we head into 2026, one thing has become clear in the last year: attackers are changing tactics, and our defenses need to evolve with them. Virtualization infrastructure, the hypervisor layer in particular, has emerged as a high-impact...

Enhance VCF 9 Security with ZeroLock®

Enhance VCF 9 Security with ZeroLock®

As organizations continue to adopt VMware Cloud Foundation (VCF) 9, security remains a top priority. Hypervisors are an increasingly critical layer which—if compromised—can give attackers complete control over the environment. VCF 9 has...

Everything You Need to Know About Hypervisors

Everything You Need to Know About Hypervisors

Virtualization changed everything about how modern computing works, but most people have no idea what’s happening under the hood. Before virtualization, companies had to buy a separate physical machine for every single application they...

DragonForce: A Threat Profile

DragonForce: A Threat Profile

Aliases DragonForce Malaysia (early hacktivist identity) DragonForce Ransomware Gang DragonLeaks (leak site) DFRansom   Get Threat Intel and Security Updates Delivered to Your Inbox. Profiling Threat Actor Type: Initially a...

CISOs: Lead the Charge in Virtualization Security in 2026

CISOs: Lead the Charge in Virtualization Security in 2026

CISOs have spent the last decade hardening endpoints, identities, and cloud workloads. Yet for many organizations, the hypervisor remains dangerously exposed. Over the past four years, hypervisor-specific ransomware has driven an...

ShinyHunters: A Threat Profile

ShinyHunters: A Threat Profile

Aliases ShinyCorp UNC6240 Sometimes referenced as “Scattered Lapsus$ Hunters” in recent collaborations. Get Threat Intel and Security Updates Delivered to Your Inbox. Profiling Threat Actor Type: Financially motivated data-theft and...

LockBit: A Threat Profile

LockBit: A Threat Profile

Aliases   ABCD ransomware   LockBit 2.0    LockBit Black (3.0)   LockBit Green   LockBit 5.0 Get Threat Intel and Security Updates Delivered to Your Inbox.   Profiling   Threat Actor Type: Ransomware-as-a-Service (RaaS) with global...

The 99% Solution:  MFA for Hypervisor Security

The 99% Solution: MFA for Hypervisor Security

Hypervisor attacks are accelerating, and the cost is catastrophic. Recent ESXi ransomware attacks have cost organizations hundreds of millions in recovery. In some cases, a single ESXi breach has led to costs exceeding $400 million.  ...