BLOG POSTS
Everything You Need to Know About Hypervisors
Virtualization changed everything about how modern computing works, but most people have no idea what’s happening under the hood. Before virtualization, companies had to buy a separate physical machine for every single application they...
How ZeroLock Mitigates BRICKSTORM: Securing VMware Against Advanced Threats
BRICKSTORM is a custom-made malware family recently being used by suspected state-aligned threat actors out of China. Some of the binary files associated with BRICKSTORM appear to have been made specifically to target vCenter servers and...
DragonForce: A Threat Profile
Aliases DragonForce Malaysia (early hacktivist identity) DragonForce Ransomware Gang DragonLeaks (leak site) DFRansom Get Threat Intel and Security Updates Delivered to Your Inbox. [hubspot_form...
CISOs: Lead the Charge in Virtualization Security in 2026
CISOs have spent the last decade hardening endpoints, identities, and cloud workloads. Yet for many organizations, the hypervisor remains dangerously exposed. Over the past four years, hypervisor-specific ransomware has driven an...
ShinyHunters: A Threat Profile
Aliases ShinyCorp UNC6240 Sometimes referenced as “Scattered Lapsus$ Hunters” in recent collaborations. Get Threat Intel and Security Updates Delivered to Your Inbox. Profiling...
LockBit: A Threat Profile
Aliases ABCD ransomware LockBit 2.0 LockBit Black (3.0) LockBit Green LockBit 5.0 Get Threat Intel and Security Updates Delivered to Your Inbox. Profiling Threat...
The 99% Solution: MFA for Hypervisor Security
Hypervisor attacks are accelerating, and the cost is catastrophic. Recent ESXi ransomware attacks have cost organizations hundreds of millions in recovery. In some cases, a single ESXi breach has led to costs exceeding $400 million. ...
Scattered Spider and the Finance Sector: Ransomware Tactics Banks Can’t Afford to Ignore
The financial sector is built on trust, speed, and constant availability. Despite publicly announcing their “retirement,” Scattered Spider has resurfaced with fresh intrusions into U.S. banks and financial services. Their latest ESXi...
Executive Briefing: Hypervisor Ransomware—The Hidden $400 Million Board-Level Exposure
Why The Board Should Act Now As hypervisor ransomware attacks surge and exposure widens, this once-overlooked layer now poses material risk to revenue, operations, and oversight. Hypervisor ransomware (specifically on VMware ESXi) has...
Scattered Spider: A Threat Profile
Aliases UNC3944 (Google Mandiant) The Com/The Community Octo Tempest (Microsoft) Oktapus (Group-IB) Muddled Libra (Palo Alto Unit 42) Scatter Swine (Okta) StarFraud Storm-0875 Profiling Demographics: Primarily young operators (assessed...
RansomHub Is Gone—But Their ESXi Ransomware Tactics Still Threaten Virtual Infrastructure
In 2024, one ransomware group surged to the forefront: RansomHub. Rapidly dominating the ransomware-as-a-service (RaaS) landscape, this formidable cybercriminal network successfully breached over 600 organizations worldwide, targeting...
Scattered Spider: The Group Behind Major ESXi Ransomware Attacks
A new wave of ransomware actors is rewriting the rulebook. Their sights are set on VMware ESXi. Scattered Spider (AKA UNC3944, 0ktapus, Muddled Libra) is one of the most agile and dangerous threat clusters in operation today. They’re not...
From Retail Floors to Virtual Cores: ESXi Is the Next Attack Vector in Retail
In April 2025, Marks & Spencer—one of Britain’s most successful retailers—was crippled by a ransomware attack that didn’t just encrypt endpoints. It locked down VMware ESXi hypervisors, freezing core systems and bringing operations to...
The Oversight That Could Cost You: Why Basic Hypervisor Protection Fails
Modern hypervisors form the backbone of today's cloud and virtualization environments. By enabling multiple business functions to reside on a single physical server, they enhance efficiency and reduce administrative overhead. As...
ZeroLock® Mitigates 100% of ESXi TTPs
MITRE ATT&CK v17 introduces a dedicated ESXi platform, marking a major shift in cybersecurity priorities. The new ESXi matrix spans 12 attack stages — adapting 34 Linux TTPs, carrying over 30 more, and introducing 4 ESXi-specific...
MITRE ATT&CK v17: Spotlighting ESXi
In a landmark update, MITRE ATT&CK v17 introduces a dedicated ESXi platform to its framework, bringing hypervisor threats into the spotlight. As a result, this move validates what security teams have been seeing for years: attackers...