VMware – which product to choose?

VMware is a company that owes its success to its virtualization products. Currently, the company’s portfolio includes solutions aimed at infrastructure virtualization, clouding, cybersecurity, disaster recovery, and much much more. In addition, speaking only about the Hyper-Converged Infrastructure department, we must bear in mind that VMware provides several different solutions. The question is obvious, which is the product for me?

Read more

BrakTooth flaws / LockFile ransomware / Malware hides in AMD, NVIDIA GPUs

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

VMware vSphere, vCenter, and ESXi – definitions and differences

Are you already familiar with VMware technology, and just want to learn more about a variety of provided features and components? Or maybe you are new to VMware virtualization and want to learn about some of the key components needed for creating a successful virtual environment? In this article, you will find information about the VMware VSphere, vCenter, and ESXi, what are those technologies’ purpose, and for what business needs they answer. We will also find differences between vSphere, ESXi, and vCenter.

Read more

VMware vRealize Operations patched / Malicious WhatsApp / MS Power App data leak

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

Linux glibc security glitch / Fortinet 0-day / New AdLoad malware variant

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

VMware ESXi – how to backup a virtual machine

Currently, Microsoft has introduced a new service called Windows 365 Cloud PC according to the “as service” approach it promotes. It is, of course, nothing but virtual computers on Microsoft’s servers. Likewise, containers, of which Docker is perhaps the most famous representative, are virtualized elements or entire operating systems. We can also virtualize the entire physical infrastructure, and that’s what VMware ESXi is for.

Read more

Biggest ever cryptocurrency theft / StealthWorker botnet / ProxyShell

Great thefts stir the imagination like no others. The famous D B Cooper’s case, the United California Bank robbery, or the Great Train Robbery from 1963. Do “electronic” thefts stir the same amount of emotions? It’s hard to say, but when over 600 million dollars disappears from one of the financial platforms, it will bring a lot of hype. But let’s keep our feet on the ground and ask really important questions. Namely, how does it happened, was there a way to prevent the theft, is there any chance to get the money back, and what about the victims – BinanceChain, Ethereum, and Polygon miners?

Read more

How to backup Microsoft 365 with Xopero ONE

Microsoft is a leader in the industry of productivity applications suites. And as such is trying to provide as complex security measures as possible. Yet it’s not possible to avoid nor protect from every threat. That is why you should not blindly trust the protection provided by Microsoft in their Office 365 suite, but rather add layers of protection to ensure your data is safe. That layer of protection can be a Microsoft 365 backup. With Xopero ONE Backup & Recovery you can set up Microsoft 365 backup, manage it, and recover data if needed with ease. In this article, we will walk you through the steps you need to take to start backup Microsoft 365 data in your organization with Xopero ONE, and we will go into more detail about setting up a personalized backup plan.

Read more

VMware snapshot technology: what it is and when to use it

In recent years, VMware has put great emphasis on its cloud technologies. Still, you have to remember that estimates show that the company’s solutions are present on about 75% (data for 2019-2020) of physical servers intended for virtualization on our globe. This means that VMware ESXi is still a leading virtualization solution, and one of the most appreciated features of this solution is undoubtedly the snapshot technology. Thanks to snapshots, for example, we can do some “kind of backup” at the moment without stopping the virtual machine, and this is something that everyone loves, but why shouldn’t I use the word “backup” in this sentence?

Read more