VMware and why is it such a power on the market

VMware is currently leading the way on the market, and this is an unquestionable claim. Suffice it to say that, according to some statistics, VMware’s share in the hypervisor market exceeds 70%. But what really makes vSphere such a desirable product, and where does its strength come from? Are its technologies such as High Availability, or maybe we, the customers, decide about the power of this product?

Read more

Amazon’s Twitch data leak / Apache HTTP Server 0-day / VMware ESXi targeted in a new campaign

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

Can I delete the VSWP file in VMware?

The simplest answer is yes, you can delete VSWP files. But you should rather ask if you really want to do it? At this time you probably figured out that VSWP is going to be the main topic of this article. We will start with answering what these files really are and why in most cases, their removal is challenging by the VMware hypervisor? Then we will move forward.

Read more

GriftHorse malware / New Windows domains backdoor / iPhone Apple Pay + Visa bug

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

New malware – TinyTurla and Capoae / Fake certificate alert and dangerous TeamViewer

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

vCenter, vSphere, ESXi, and the power of VMware

VMware has many products in its portfolio that are aimed at various users, companies, and various projects. If our main goal is to build a virtual environment, the combination of ESXi, vCenter and vSphere products is what we are looking for. The very planning and implementation of the virtual environment are as important as taking care of its proper backup after startup – and that we should never forget.

Read more

OMIGOD vulnerabilities / Apple fixed newest 0-day / Windows Subsystem for Linux

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

VMware and the 1/3 rule

Currently, we can risk a statement that not only global corporations but also medium and small companies decide to introduce the principle of dividing infrastructure into three parts. What does it really mean, and why do so many in the IT industry praise such a solution? 

Read more

Fortinet FortiGate VPN credentials leak / The newest 0-days: Office 365, and Ghostscript

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more