information security
-
VMware
๐ด Oct 24’s Top Cyber News NOW! – Ep 736
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: Take control of your data and keep your private life private by signing up for DeleteMe. Go to and use promo code SIMPLYCYBER for 20% off.โฏ Check out John Strand’s Pay What You…
Read More » -
VMware
๐ด Oct 22’s Top Cyber News NOW! – Ep 734
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: Take control of your data and keep your private life private by signing up for DeleteMe. Go to and use promo code SIMPLYCYBER for 20% off.โฏ Check out John Strand’s Pay What You…
Read More » -
Proxmox
๐ด Oct 18’s Top Cyber News NOW! – Ep 732
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: Allow what you need, block everything else… Including ransomware. Zero trust Endpoint Protection Platform at Check out John Strand’s Pay What You Can Antisyphon Training: Get my GRC Analyst Master Class, packed with…
Read More » -
Proxmox
CrikeyCon IX (2024) – Iain Dickson – Letโs get these tests to the (home)lab(rador)
Let’s get these tests to the (home)lab(rador) by Iain Dickson. [ad_2] source
Read More » -
Virtualization
How to Become a Cloud Engineer? Cloud Computing Roadmap
๐ฅ๏ธ How to Become a Cloud Engineer? Cloud Computing Roadmap Are you looking to start a career in cloud computing and become a cloud engineer? In this video, Iโll explain everything you need to know to get started in this in-demand field! Weโll walk through the cloud computing roadmap, essential skills, certifications, and tools youโll need to succeed as a…
Read More » -
VMware
DEF CON 32 – Bug Hunting In VMware Device Virtualization – JiaQing Huang, Hao Zheng, Yue Liu
In this presentation, we will unveil a new attack surface: Device Virtualization in VMKernel. This isan unknown territory that has not been explored by security researchers to date. During the reverse engineering of the VMware Hypervisor, we discovered 8 vulnerabilities related to device virtualization, 3 of them have been assigned CVE number (some vulnerabilities have even been successfully exploited in…
Read More »