Vali Cyber, Inc., a next-generation provider of Linux cybersecurity solutions, announces that its autonomous zero-trust security platform, ZeroLock® has been expanded to protect ESXi hypervisors, 6.7+. With no other runtime security currently available for ESXi, Vali...
“Leaky Vessels” (CVE-2024-21626) is targeting containerized environments and enabling attackers to escape containers and compromise host systems, presenting a critical risk to cloud-native applications. Watch as our Threat Intel Lead, Nathan Montierth,...
The recently discovered BiBi-Linux Wiperware overwrites files, renames them with a random string containing “BiBi,” and excludes specific file types from corruption. This x64 ELF executable, devoid of obfuscation, poses a significant threat as it can...
The Looney Tunables (CVE-2023-4911) vulnerability has been discovered in GNU C Library’s dynamic loader, allowing attackers to act with root privileges on any Linux distribution running glibc. Join our Threat Intel lead, Nathan Montierth, as he demonstrates how...
We are excited to share that ZeroLock® has been recognized by WhiteHawk in their prestigious list of the Top 10 Innovative Cyber Solutions of 2024! This honor highlights our dedication to pushing the boundaries of cybersecurity, offering cutting-edge solutions that...
In an enlightening interview with Edward Amoroso, CEO of TAG Infosphere, our CTO and co-founder, Austin Gadient, delves right into the heart of Linux and ESXi security, unveiling the challenges that drove the creation of ZeroLock®. From his early days in the Air Force...
Attacks on ESXi servers have been in the news lately, notably the alleged MGM Casino’s ransomware attack which cost the company about $100 million, as well as the alleged ransomware attack on Johnson Controls resulting in a $60 million impact. These types of...
The XL Security Elephant in the Room Usage of ESXi servers is increasingly popular for organizations with a need for effective virtualization and continuous access to their Virtual Machine (VM) management. Unfortunately, this also makes ESXi servers a prime target for...
by Dan Sheehan Within the continually evolving realm of cybersecurity, the Zero Trust model has emerged as a paramount strategy. This approach operates on a simple yet fundamental principle: “Never trust, always verify.” However, implementing Zero Trust...
Imagine a financial institution where all virtual machines—responsible for everything from customer transactions to trade executions—suddenly go dark. Operations freeze, data is locked, and millions are at stake. This is no hypothetical scenario; it’s the reality...