K14760551: Multiple libwebp vulnerabilities

Multiple libwebp vulnerabilities Security Advisory Security Advisory Description CVE-2018-25009 A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ... More info: https://support.f5.com/csp/article/K14760551?utm_source=f5support&utm_medium=RSS

K40778012: Intel CPU vulnerability CVE-2021-0127

Intel CPU vulnerability CVE-2021-0127 Security Advisory Security Advisory Description Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to ... More info: https://support.f5.com/csp/article/K40778012?utm_source=f5support&utm_medium=RSS

Digital Brand Protection in an Era of Cloud Jacking

In a multi-cloud world, cyberattacks are burgeoning. According to the FBI, cybercrime increased by 300% in 2021. The World Economic Forum stated that cyberattacks are one of the most significant risks posed to corporations in their annual risk index. Cyber cartels are hijacking the digital transformation of corporations and escalating intrusions by leveraging destructive attacks … ContinuedThe post Digital Brand Protection in an Era of Cloud Jacking appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2022/02/digital-brand-protection-in-an-era-of-cloud-jacking.html?utm_source=rss&utm_medium=rss&utm_campaign=digital-brand-protection-in-an-era-of-cloud-jacking

Cryptomining Attacks and Techniques – Analysis from VMware Threat Report

Cybercriminals are setting their sights on organizations to secretly mine cryptocurrencies with Linux-based multi-cloud environments becoming prime targets, according to “Exposing Malware in Linux-Based Multi-Cloud Environments,” a report conducted by the VMware Threat Analysis Unit. This post highlights some key analysis of the cryptomining components used in recent cryptojacking attacks, techniques deployed, and how the … ContinuedThe post Cryptomining Attacks and More info: https://blogs.vmware.com/security/2022/02/cryptomining-attacks-and-techniques-analysis-from-vmware-threat-report.html?utm_source=rss&utm_medium=rss&utm_campaign=cryptomining-attacks-and-techniques-analysis-from-vmware-threat-report

AvosLocker – Modern Linux Ransomware Threats

Summary AvosLocker Ransomware is a recent ransomware with the capability to encrypt Linux systems. AvosLocker seems to be targeting the VMware ESXi virtual machines and Virtual Machine File System (VMFS) files. By targeting VMs, AvosLocker takes advantage of faster and easier encryption of multiple servers with a single command. Behavioral Summary On execution, AvosLocker … ContinuedThe post AvosLocker – Modern Linux Ransomware Threats appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2022/02/avoslocker-modern-linux-ransomware-threats.html?utm_source=rss&utm_medium=rss&utm_campaign=avoslocker-modern-linux-ransomware-threats

Announcing Container Runtime Security for VMware Carbon Black Container

This article was authored by Oren Penso and Ram Akuka It’s no secret that Kubernetes and container adoption has skyrocketed over the last several years, with double-digit growth expected to continue as enterprises increasingly embrace the modern apps transformation. While there are many benefits to leveraging containers and Kubernetes to enable business agility, cloud-native technology … ContinuedThe post Announcing Container Runtime Security for VMware Carbon Black Container More info: https://blogs.vmware.com/security/2022/03/announcing-container-runtime-security-for-vmware-carbon-black-container.html?utm_source=rss&utm_medium=rss&utm_campaign=announcing-container-runtime-security-for-vmware-carbon-black-container

VMware Named to the 2022 CRN Security 100

We are proud to announce that CRN®, a brand of The Channel Company, has named VMware to its 2022 Security 100 list. Recognizing leading IT channel security leaders, the Security 100 list honorees bring a combination of channel focus and trailblazing, as well as innovative technology to solution providers. Security continues to be a top … ContinuedThe post VMware Named to the 2022 CRN Security 100 appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2022/02/vmware-named-to-2022-crn-security-100.html?utm_source=rss&utm_medium=rss&utm_campaign=vmware-named-to-2022-crn-security-100

Shields Up: Prepare for Destructive Cyberattacks

UPDATED March 10, 2022: This blog post was updated to provide the latest information on VMware’s response regarding Ukraine. How we’re prioritizing security and resiliency for VMware customers VMware is suspending all business operations in Russia and Belarus. We stand with Ukraine, and we commend the bravery of the Ukrainian people. You can view our … ContinuedThe post Shields Up: Prepare for Destructive Cyberattacks appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2022/03/shields-up-prepare-for-destructive-cyberattacks.html?utm_source=rss&utm_medium=rss&utm_campaign=shields-up-prepare-for-destructive-cyberattacks

3/16/22 Webinar: Securing the Container Lifecycle from Build to Run with VMware Security

The top three security concerns for IT Operations are applying policy consistently across clusters and teams, securing container images in a CI/CD pipeline, and securing containerized workloads at runtime, according to The State of Kubernetes 2021 report. In this upcoming webinar Securing the Container Lifecycle from Build to Run with VMware Security on March 16th, … ContinuedThe post 3/16/22 Webinar: Securing the Container Lifecycle from Build to Run with VMware Security appeared first More info: https://blogs.vmware.com/security/2022/03/3-16-22-webinar-securing-the-container-lifecycle-from-build-to-run-with-vmware-security.html?utm_source=rss&utm_medium=rss&utm_campaign=3-16-22-webinar-securing-the-container-lifecycle-from-build-to-run-with-vmware-security

Ransomware Attacks and Techniques – Analysis from VMware Threat Report

Ransomware attacks are evolving to target Linux-based cloud environments and often combine data exfiltration and double-extortion tactics, according to Exposing Malware in Linux-Based Multi-Cloud Environments, a VMware Threat Analysis Unit report. This post highlights some key analysis of recent ransomware attacks against cloud deployment, insights on techniques deployed, and how the threat can be detected … ContinuedThe post Ransomware Attacks and Techniques – Analysis from VMware More info: https://blogs.vmware.com/security/2022/03/ransomware-attacks-and-techniques-analysis-from-vmware-threat-report.html?utm_source=rss&utm_medium=rss&utm_campaign=ransomware-attacks-and-techniques-analysis-from-vmware-threat-report
Translate »