VMware Aria exploit Neutralized by Vali Cyber’s ZeroLock®

VMware Aria Operations for Networks (formerly vRealize Network Insight) is vulnerable to a critical severity authentication bypass flaw that could allow remote attackers to bypass SSH authentication and access private endpoints. Join Nathan Montierth, Vali...

Lockdown Rules

Using ZeroLock® lockdown rules to prevent ESXi attacks

CLI-MFA

ZeroLock® prevents unauthorized access with CLI-MFA

GameOver(lay) Gets Destroyed by Vali Cyber’s ZeroLock®

CVE-2023-2640 and CVE-2023-32629 are two easy-to-exploit privilege escalation vulnerabilities in the OverlayFS module in Ubuntu that affect 40% of Ubuntu cloud workloads. Cleverly nicknamed gameOver(lay), Vali Cyber’s ZeroLock can both remediate as well as...

AI Kills Hash Based Detections

Whether it is ChatGPT, GPT4, Bard, or any of the other AI systems competing for public attention, these systems represent a significant leap forward in Malware as a Service (MaaS) capabilities. While it is true there are supposed to be guard rails that prevent...

A Brief History of NAS Ransomware

It is no secret that NAS devices are frequently targeted by ransomware attacks, and for good reason. Critical data is often stored on devices. Furthermore, NAS devices typically store large amounts of data. NAS devices run Linux operating systems, so malware written...

The Risks of Using eBPF for Security

The Risks of Using eBPF for Security eBPF (extended Berkeley Packet Filters) has emerged as a powerful tool for extending the functionality of the Linux kernel, enabling the implementation of security solutions. However, using eBPF for security purposes is not without...

Protecting Kubernetes Clusters with ZeroLock®

Protecting Kubernetes Clusters with ZeroLock® In this white paper, we examine how ZeroLock protects Kubernetes clusters from attacks at runtime. Why Runtime Security for Kubernetes First, you might be asking yourself, “What is runtime protection and why do I need it?”...