Scattered Spider may not live on Mount Crumpit, but their playbook for stealing Christmas—and your virtual infrastructure—would make even the Grinch proud. Join Joseph Comps, Threat Intelligence Analyst at Vali Cyber, for a deep dive into one of the most destructive...
The December 2025 CISA/NSA/Cyber Centre analysis of BRICKSTORM represents one of the clearest signals yet that hypervisors have become priority targets for state-backed cyber operations. The report attributes BRICKSTORM to PRC state-sponsored actors and documents a...
As organizations continue to adopt VMware Cloud Foundation (VCF) 9, security remains a top priority. Hypervisors are an increasingly critical layer which—if compromised—can give attackers complete control over the environment. VCF 9 has introduced several advanced...
When attackers reach the virtualization layer, they gain control of the systems that run the entire business. This unfortunate scenario has occurred exponentially in recent years as threat actors discover that the hypervisor remains the least monitored, least...
Virtualization changed everything about how modern computing works, but most people have no idea what’s happening under the hood. Before virtualization, companies had to buy a separate physical machine for every single application they ran. Rooms of hardware, insane...