UPDATED March 10, 2022: This blog post was updated to provide the latest information on VMware’s response regarding Ukraine. How we’re prioritizing security and resiliency for VMware customers VMware is suspending all business operations in Russia and Belarus. We stand with Ukraine, and we commend the bravery of the Ukrainian people. You can view our The post Shields Up: Prepare for Destructive Cyberattacks appeared first on VMware Security Blog.
More info:
https://blogs.vmware.com/security/2022/03/shields-up-prepare-for-destructive-cyberattacks.html?utm_source=rss&utm_medium=rss&utm_campaign=shields-up-prepare-for-destructive-cyberattacks
BIG-IP Edge Client for Windows vulnerability CVE-2021-23022 Security Advisory Security Advisory Description The BIG-IP Edge Client Windows Installer Services temporary folder has weak file and ...
More info:
https://support.f5.com/csp/article/K08503505?utm_source=f5support&utm_medium=RSS
BIG-IP Edge Client for Windows vulnerability CVE-2021-23023 Security Advisory Security Advisory Description A DLL hijacking issue exists in cachecleaner.dll included in the BIG-IP Edge Client ...
More info:
https://support.f5.com/csp/article/K33757590?utm_source=f5support&utm_medium=RSS
78% of the most popular websites are powered by Linux, which means malware targeting Linux-based operating systems are attacking multi-cloud environments at an alarming rate. Threats such as ransomware, cryptomining components, and remote access tools (RATs) take advantage of weak authentication, vulnerabilities, and misconfigurations in container-based infrastructures. To support IT leaders and cybersecurity professionals in The post Learn About the Threats Lurking in Your Linux-Based
More info:
https://blogs.vmware.com/security/2022/02/learn-about-the-threats-lurking-in-your-linux-based-multi-cloud.html?utm_source=rss&utm_medium=rss&utm_campaign=learn-about-the-threats-lurking-in-your-linux-based-multi-cloud
In the past five years, Linux has become the most common operating system (OS) in multi-cloud environments and powers more than 78 percent of the most popular websites. Malicious actors have taken notice and are increasingly targeting vulnerable Linux-based systems in multi-cloud environments to infiltrate corporate and government networks. These threats take advantage of weak The post VMware Threat Report – Exposing Malware in Linux-Based Multi-Cloud Environments appeared first on VMware
More info:
https://blogs.vmware.com/security/2022/02/2022-vmware-threat-report-exposing-malware-in-linux-based-multi-cloud-environments.html?utm_source=rss&utm_medium=rss&utm_campaign=2022-vmware-threat-report-exposing-malware-in-linux-based-multi-cloud-environments
Ransomware attacks are evolving to target Linux-based cloud environments and often combine data exfiltration and double-extortion tactics, according to Exposing Malware in Linux-Based Multi-Cloud Environments, a VMware Threat Analysis Unit report. This post highlights some key analysis of recent ransomware attacks against cloud deployment, insights on techniques deployed, and how the threat can be detected The post Ransomware Attacks and Techniques – Analysis from VMware Threat Report
More info:
https://blogs.vmware.com/security/2022/03/ransomware-attacks-and-techniques-analysis-from-vmware-threat-report.html?utm_source=rss&utm_medium=rss&utm_campaign=ransomware-attacks-and-techniques-analysis-from-vmware-threat-report
The top three security concerns for IT Operations are applying policy consistently across clusters and teams, securing container images in a CI/CD pipeline, and securing containerized workloads at runtime, according to The State of Kubernetes 2021 report. In this upcoming webinar Securing the Container Lifecycle from Build to Run with VMware Security on March 16th, The post 3/16/22 Webinar: Securing the Container Lifecycle from Build to Run with VMware Security appeared first on VMware Security
More info:
https://blogs.vmware.com/security/2022/03/3-16-22-webinar-securing-the-container-lifecycle-from-build-to-run-with-vmware-security.html?utm_source=rss&utm_medium=rss&utm_campaign=3-16-22-webinar-securing-the-container-lifecycle-from-build-to-run-with-vmware-security
VMware is closely monitoring the evolving situation in Ukraine, and in addition to the safety and wellbeing of our employees in the region, we are focused on protecting customer business continuity and mitigating risk from cyber threats. You can view our public statement here. The VMware Threat Analysis Unit (TAU) is actively monitoring malicious activity The post Shields Up: Prepare for Destructive Cyberattacks appeared first on VMware Security Blog.
More info:
https://blogs.vmware.com/security/2022/03/shields-up-prepare-for-destructive-cyberattacks.html?utm_source=rss&utm_medium=rss&utm_campaign=shields-up-prepare-for-destructive-cyberattacks
F5 SIRT response to the Ukraine crisis Security Advisory Security Advisory Description Over the past few weeks, the world has watched as tensions have risen between Russia and Ukraine, and most ...
More info:
https://support.f5.com/csp/article/K42406850?utm_source=f5support&utm_medium=RSS
Linux kernel vulnerability CVE-2022-0185 Security Advisory Security Advisory Description A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem ...
More info:
https://support.f5.com/csp/article/K73200428?utm_source=f5support&utm_medium=RSS