circle

Sin categoría

Threat hunting
Sin categoría

Threat hunting: How is the process?

Threat hunting is essential for cybersecurity, enabling the identification and mitigation of risks before they cause harm. In this guide, we will address key topics such as defining objectives, data collection, and the tools necessary for conducting effective analysis related to threat hunting.…

VMware
Sin categoría

VMware ESXi at risk: Ransomware attacks

Microsoft researchers have found a critical vulnerability in VMware ESXi hypervisors. Moreover, ransomware operators are using this issue to attack systems.   Global risk This vulnerability, CVE-2024-37085, allows threat actors to gain full administrative permissions on domain-joined hypervisors, thereby posing a serious risk…