Lockdown

Using ZeroLocks lockdown rules to prevent attacks

Log4j

ZeroLock detects and stops ransomware launched via a Log4j vulnerability

SSH-MFA

ZeroLock prevents unauthorized access with SSH-MFA

Unraveling the Jargon: Understanding Endpoint Security and Beyond

Back in 2013, a game-changing technology called EDR burst onto the scene, revolutionizing our approach to safeguarding our digital domains. This “new” tech sought to supercharge digital forensics on endpoint systems, eliminating the need for physical access to host...

GameOver(lay) gets destroyed by Vali Cyber’s ZeroLock

CVE-2023-2640 and CVE-2023-32629 are two easy-to-exploit privilege escalation vulnerabilities in the OverlayFS module in Ubuntu that affect 40% of Ubuntu cloud workloads. Cleverly nicknamed gameOver(lay), Vali Cyber’s ZeroLock can both remediate as well as...

AI Kills Hash Based Detections

Whether it is ChatGPT, GPT4, Bard, or any of the other AI systems competing for public attention, these systems represent a significant leap forward in Malware as a Service (MaaS) capabilities. While it is true there are supposed to be guard rails that prevent...

A Brief History of NAS Ransomware

It is no secret that NAS devices are frequently targeted by ransomware attacks, and for good reason. Critical data is often stored on devices. Furthermore, NAS devices typically store large amounts of data. NAS devices run Linux operating systems, so malware written...