Xopero Blog

OMIGOD vulnerabilities / Apple fixed newest 0-day / Windows Subsystem for Linux

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

VMware and the 1/3 rule

Currently, we can risk a statement that not only global corporations but also medium and small companies decide to introduce the principle of dividing infrastructure into three parts. What does it really mean, and why do so many in the IT industry praise such a solution? 

Read more

Fortinet FortiGate VPN credentials leak / The newest 0-days: Office 365, and Ghostscript

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

VMware – which product to choose?

VMware is a company that owes its success to its virtualization products. Currently, the company’s portfolio includes solutions aimed at infrastructure virtualization, clouding, cybersecurity, disaster recovery, and much much more. In addition, speaking only about the Hyper-Converged Infrastructure department, we must bear in mind that VMware provides several different solutions. The question is obvious, which is the product for me?

Read more

BrakTooth flaws / LockFile ransomware / Malware hides in AMD, NVIDIA GPUs

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

VMware vSphere, vCenter, and ESXi – definitions and differences

Are you already familiar with VMware technology, and just want to learn more about a variety of provided features and components? Or maybe you are new to VMware virtualization and want to learn about some of the key components needed for creating a successful virtual environment? In this article, you will find information about the VMware VSphere, vCenter, and ESXi, what are those technologies’ purpose, and for what business needs they answer. We will also find differences between vSphere, ESXi, and vCenter.

Read more

VMware vRealize Operations patched / Malicious WhatsApp / MS Power App data leak

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

Linux glibc security glitch / Fortinet 0-day / New AdLoad malware variant

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

VMware ESXi – how to backup a virtual machine

Currently, Microsoft has introduced a new service called Windows 365 Cloud PC according to the “as service” approach it promotes. It is, of course, nothing but virtual computers on Microsoft’s servers. Likewise, containers, of which Docker is perhaps the most famous representative, are virtualized elements or entire operating systems. We can also virtualize the entire physical infrastructure, and that’s what VMware ESXi is for.

Read more