“Leaky Vessels” (CVE-2024-21626) is targeting containerized environments and enabling attackers to escape containers and compromise host systems, presenting a critical risk to cloud-native applications. Watch as our Threat Intel Lead, Nathan Montierth,...
The recently discovered BiBi-Linux Wiperware overwrites files, renames them with a random string containing “BiBi,” and excludes specific file types from corruption. This x64 ELF executable, devoid of obfuscation, poses a significant threat as it can...
The Looney Tunables (CVE-2023-4911) vulnerability has been discovered in GNU C Library’s dynamic loader, allowing attackers to act with root privileges on any Linux distribution running glibc. Join our Threat Intel lead, Nathan Montierth, as he demonstrates how...
We are excited to share that ZeroLock® has been recognized by WhiteHawk in their prestigious list of the Top 10 Innovative Cyber Solutions of 2024! This honor highlights our dedication to pushing the boundaries of cybersecurity, offering cutting-edge solutions that...
In an enlightening interview with Edward Amoroso, CEO of TAG Infosphere, our CTO and co-founder, Austin Gadient, delves right into the heart of Linux and ESXi security, unveiling the challenges that drove the creation of ZeroLock®. From his early days in the Air Force...
Attacks on ESXi servers have been in the news lately, notably the alleged MGM Casino’s ransomware attack which cost the company about $100 million, as well as the alleged ransomware attack on Johnson Controls resulting in a $60 million impact. These types of...
The XL Security Elephant in the Room Usage of ESXi servers is increasingly popular for organizations with a need for effective virtualization and continuous access to their Virtual Machine (VM) management. Unfortunately, this also makes ESXi servers a prime target for...
by Dan Sheehan Within the continually evolving realm of cybersecurity, the Zero Trust model has emerged as a paramount strategy. This approach operates on a simple yet fundamental principle: “Never trust, always verify.” However, implementing Zero Trust...
The finance sector has become increasingly reliant on technology to streamline operations, provide innovative financial services, and enhance customer experiences. However, this increased digitalization has expanded the attack surface for threats. In 2022, ransomware...
Explore the intricacies of eBPF and its role in ensuring runtime cloud security with Austin Gadient, Vali Cyber’s CTO and Co-Founder, at his SANS Hackfest presentation titled “A Compendium of Exploits and Bypasses for eBPF-based Cloud Security”. In this presentation...