ZeroLock: Sealing the Cracks Against Leaky Vessels

“Leaky Vessels” (CVE-2024-21626) is targeting containerized environments and enabling attackers to escape containers and compromise host systems, presenting a critical risk to cloud-native applications. Watch as our Threat Intel Lead, Nathan Montierth,...

BiBi-Linux begone: Vali Cyber’s ZeroLock triumphs with behavioral detection

The recently discovered BiBi-Linux Wiperware overwrites files, renames them with a random string containing “BiBi,” and excludes specific file types from corruption. This x64 ELF executable, devoid of obfuscation, poses a significant threat as it can...

That’s all, Folks! Vali Cyber’s ZeroLock ends Linux Looney Tunables attack

The Looney Tunables (CVE-2023-4911) vulnerability has been discovered in GNU C Library’s dynamic loader, allowing attackers to act with root privileges on any Linux distribution running glibc. Join our Threat Intel lead, Nathan Montierth, as he demonstrates how...

ZeroLock Featured in WhiteHawk’s Top 10 Innovative Cyber Solutions of 2024

We are excited to share that ZeroLock has been recognized by WhiteHawk in their prestigious list of the Top 10 Innovative Cyber Solutions of 2024! This honor highlights our dedication to pushing the boundaries of cybersecurity, offering cutting-edge solutions that...

Advancing Linux and ESXi Security: An Interview with TAG Infosphere

In an enlightening interview with Edward Amoroso, CEO of TAG Infosphere, our CTO and co-founder, Austin Gadient, delves right into the heart of Linux and ESXi security, unveiling the challenges that drove the creation of ZeroLock. From his early days in the Air Force...

Virtual Demo: ZeroLock for ESXi, the first ever runtime security for hypervisors

Attacks on ESXi servers have been in the news lately, notably the alleged MGM Casino’s ransomware attack which cost the company about $100 million, as well as the alleged ransomware attack on Johnson Controls resulting in a $60 million impact. These types of...

Breaking Down ESXi

The XL Security Elephant in the Room Usage of ESXi servers is increasingly popular for organizations with a need for effective virtualization and continuous access to their Virtual Machine (VM) management. Unfortunately, this also makes ESXi servers a prime target for...

Securing Linux with AI: Revolutionizing Zero-Trust Security 

by Dan Sheehan Within the continually evolving realm of cybersecurity, the Zero Trust model has emerged as a paramount strategy. This approach operates on a simple yet fundamental principle: “Never trust, always verify.”  However, implementing Zero Trust...

Fortifying Finance: Navigating the Cybersecurity Landscape in the Financial Sector

The finance sector has become increasingly reliant on technology to streamline operations, provide innovative financial services, and enhance customer experiences. However, this increased digitalization has expanded the attack surface for threats. In 2022, ransomware...

Presentation: A Compendium of Exploits and Bypasses for eBPF-based Cloud Security

Explore the intricacies of eBPF and its role in ensuring runtime cloud security with Austin Gadient, Vali Cyber’s CTO and Co-Founder, at his SANS Hackfest presentation titled “A Compendium of Exploits and Bypasses for eBPF-based Cloud Security”. In this presentation...