Wednesday, August 10, 2022
WMware

Deepfake Attacks and Cyber Extortion are the Focus of New VMware Report

On day one of Black Hat USA 2022, we at VMware published our eighth annual Global Incident Response Threat Report. This report measures the cybersecurity landscape and highlights the challenges from the perspective of incident responders. This year we...
WMware

VMware Announces Advanced Workload Security for AWS

Public Cloud Introduces Unique Security Challenges  As cloud adoption continues to grow, it is no surprise that in the last 18 months nearly 80% of companies have experienced at least one cloud data breach, while 43% have reported 10 or...
WMware

VMware Explore US 2022 – The Security Mindset: Changing the Way You Think About Enterprise Security

People are at the heart of the modern IT organization. People are the decision makers, influencers, and operators that design, deploy, and manage the best enterprise environments in the world. As technology rapidly evolves, so too must the people...
WMware

VMSA-2022-0021: What You Need to Know

On August 2, 2022 VMware released a critical security advisory, VMSA-2022-0021, that addresses security vulnerabilities found and resolved in VMware’s Workspace ONE Access, VMware Identity Manager (vIDM), vRealize Lifecycle Manager, vRealize Automation, and VMware Cloud Foundation products. VMware Identity...
WMware

The 10 Sessions at VMware Explore 2022 You Can’t Miss

VMware Explore 2022 is fast approaching and I’m sure you’re wondering what we have in store for you. As you already know, we’ve changed the name of this event from VMworld to VMware Explore. We’ve done this to better...
WMware

What are the Methods and Motives for Hacking?

While it seems like a worn-out trope to describe our world as “shifting rapidly,” it can’t be understated how the pandemic changed everything regarding cybersecurity. Ransomware, for example, has risen in prevalence over the years and continues to threaten...
WMware

How Push Notifications are Abused to Deliver Fraudulent Links

In the past few weeks our very own VMware Contexa has reported a surge of malicious PDF files (shown in Figure 1). Attackers will use a malicious PDF to lure victims into visiting fraudulent web sites using fake captcha...
WMware

Empowering the Public Sector: VMware Carbon Black Cloud Achieves FedRAMP High Authorization

We are excited to announce that VMware Carbon Black Cloud on AWS GovCloud (US) has achieved the Federal Risk and Authorization Management Program (FedRAMP) High Authorization through the Joint Authorization Board (JAB). This is especially important since this means...
WMware

New Partner Guide Makes it Easy to Help Customers Stay Competitive with IT Security Modernization

If there’s anything business leaders have learned over the last two years, it’s that you must be equally nimble and strategic to succeed. The IT security innovation flywheel is spinning at an insane speed; meanwhile, cybercriminals are taking advantage...
WMware

Lateral Movement in the Real World: A Quantitative Analysis

Computer networks have become larger, more complex, and highly dynamic. Similarly, the tactics, techniques, and procedures (TTPs) adopted by powerful adversaries often backed by nation-states have evolved, creating challenges for security administrator and SOC analysts, who must make sense...
WMware

The End-to-End Zero Trust Journey: How Did We Get Here?

Introducing the new VMware Zero Trust blog series  This is the first in a series of blogs meant to demystify Zero Trust based on interactions with our customers, industries, and standards. With mounting hype behind zero trust, our customers come...
WMware

How to Resolve Alert Fatigue for Security Teams

Our rapid developments in detection and remediation give security teams the information they need to solve security issues in real-time. On the flip side, this increases the potential for alert fatigue where teams are bombarded with threat notifications without...
WMware

Moving from Angst to Assurance: Selling Executives on Cybersecurity Solutions

Over recent weeks, I have had some great conversations with colleagues Tom Kellermann, Rick McElroy & Karen Worstell on my favorite topic, cybersecurity. I am fortunate to have been involved in the industry way before it was trendy, as...
WMware

VMware Carbon Black Cloud Point of Presence Launches in United Kingdom

Today, VMware is announcing the general availability of VMware Carbon Black Cloud’s point of presence (PoP) in the United Kingdom. The PoP will deliver cloud native endpoint and workload protection for customers that need to meet the UK government’s...
WMware

VMware Wins Global Infosec Awards at RSA Conference 2022 

Today, at RSA Conference 2022, Cyber Defense Magazine named VMware a winner in its 10th Annual Global InfoSec Awards in the following categories:  “Best Solution in Application Security” for VMware Carbon Black Container  “Most Innovative Insider Threat Detection” for VMware NSX Network Detection...

Phishers who breached Twilio and fooled Cloudflare could easily get you, too

Enlarge (credit: Getty Images) At least two security-sensitive companies—Twilio and Cloudflare—were targeted in a phishing attack by an advanced threat actor who had possession of home phone numbers of not...
Brian Krebs

Microsoft Patch Tuesday, August 2022 Edition

Microsoft today released updates to fix a record 141 security vulnerabilities in its Windows operating systems and related software. Once again, Microsoft is patching a zero-day vulnerability in the Microsoft Support Diagnostics Tool (MSDT), a service built into Windows....

One of 5G's Biggest Features Is a Security Minefield

New research found troubling vulnerabilities in the 5G platforms carriers offer to wrangle embedded device data.
The Register

Patch Tuesday: Yet another Microsoft RCE bug under active exploit

Oh, and that critical VMware auth bypass vuln? Miscreants found it, too August Patch Tuesday clicks off the week of hacker summer camp in Las Vegas this year, so it's basically a code cracker's holiday too. …