Virtualization changed everything about how modern computing works, but most people have no idea what’s happening under the hood. Before virtualization, companies had to buy a separate physical machine for every single application they ran. Rooms of hardware, insane...
BRICKSTORM is a custom-made malware family recently being used by suspected state-aligned threat actors out of China. Some of the binary files associated with BRICKSTORM appear to have been made specifically to target vCenter servers and VMware virtualized...
In this episode of The CyberVault, Austin Gadient, Co-Founder and CTO of Vali Cyber, breaks down why attackers are targeting the hypervisor, how groups like Scattered Spider are reaching deeper into virtualized environments, and why protecting the hypervisor is...
The intricate architecture of hypervisors, while providing remarkable flexibility and scalability for enterprise-level operations, also represents one of the most critical under-protected attack surfaces existing today. This concurrently introduces significant...
CISOs have spent the last decade hardening endpoints, identities, and cloud workloads. Yet for many organizations, the hypervisor remains dangerously exposed. Over the past four years, hypervisor-specific ransomware has driven an estimated $1 billion in damage, with...
As enterprise virtualization scales, hypervisors like VMware ESXi have become critical—and increasingly exploited—attack surfaces. High-profile breaches such as Scattered Spider, the MGM Resorts ($110M) incident, and the Johnson Controls ($51M) breach demonstrate the...