REvil’s Linux Version Targets VMware ESXi Virtual Machines

Organizations running ESXi environments that thought they had somehow escaped the attention of REvil ransomware operators are in for a rude awakening – the ransomware-as-a-service’s repertoire now includes a Linux version aimed squarely at VMware ESXi… Continue reading REvil’s Linux Version Targets VMware ESXi Virtual Machines

Seek and Ye Shall Command

If we count all the screens in our lives, it takes a hot minute. Some of them are touchscreens, some need a mouse or keyboard, but we are accustomed to all the input devices. Not everyone can use the various methods, like cerebral palsy patients who rely on eye-tracking hardware. …read more

Continue reading Seek and Ye Shall Command

Cybersecurity Investment to Shoot Up in Financial Industry in 2019; Top Firms Already Spend $1 Billion

A look back on 2018 shows the financial services industry turned out to be the most at risk, with security incidents and breaches skyrocketing. Top threats to the financial services industry include cloud security and third-party risks, while the … Continue reading Cybersecurity Investment to Shoot Up in Financial Industry in 2019; Top Firms Already Spend $1 Billion

Hypervisor Security, Presentation by Ian Pratt

Bromium’s co-founder Ian Pratt delivered an insightful talk about hypervisors at Black Hat USA In his talk, Ian examines the evolution of hypervisor design, architecture, and technology over the years If you have missed Ian’s session at Bla… Continue reading Hypervisor Security, Presentation by Ian Pratt

Alleged North Korean Threat Actor Targets Select Victims with another Critical Zero-Day Vulnerability Attack

Attributing cyberattacks and advanced malware to a particular country or entity is usually troublesome. Forensic artefacts can sometimes be planted or forged to point to a specific country or cybercriminal group.
The post Alleged North Korean Thre… Continue reading Alleged North Korean Threat Actor Targets Select Victims with another Critical Zero-Day Vulnerability Attack