πŸ•΅οΈβ€β™€οΈ Bitdefender uncovered a cyber-espionage campaign using virtual machines as a stealth layer.

The group, dubbed Curly COMrades, used Hyper-V to deploy lightweight Linux VMs that ran custom malware while staying invisible to Windows-based defenses.

Targets: government & energy networks in Georgia and Moldova.

Focus: persistence, stealth, and low detection footprint.

πŸ’¬ How should defenders monitor virtualization layers without overextending detection fatigue?

#CyberSecurity #ThreatIntel #APT #CurlyCOMrades #Russia #InfoSec #MalwareAnalysis #VirtualizationSecurity

Virtualized environments may no longer be as safe as we thought. The new VMScape vulnerability lets guest systems peek into host data by exploiting shared CPU predictions. How vulnerable is your cloud?

https://thedefendopsdiaries.com/vmscape-attack-a-new-threat-to-virtualized-environments/

#vmscape
#virtualizationsecurity
#cloudsecurity
#cyberthreats
#amdintelvulnerability

πŸ’₯πŸ–₯️ Don't miss Nathan Montierth's #BSidesBoulder25 talk "Navigating the Virtualization Battlefield: A Deep Dive into Hypervisor Attack Vectors", which plans to explore how attackers are breaching hypervisors (think ESXi, Active Directory, and more), and what you can do to fight back! πŸ›‘οΈπŸ’₯

Organizations globally have embraced virtualization as a way to scale solutions and centralize network management, but if your hypervisor gets popped, it could cost your organization millions. If you run virtualized infrastructure, this one’s mission-critical. #BSides #BSidesBoulder #CyberSecurity #VirtualizationSecurity #HypervisorHacking #CyberDefense

Check out our full schedule at https://bsidesboulder.org/schedule/

Tickets are available for purchase for our 13 June event here: https://www.eventbrite.com/e/bsides-boulder-2025-registration-1290129274389

XenServer VM Tools vulnerabilities let attackers gain kernel privileges on Windows VMs. If you run virtualized Windows environments, patch NOW!

#SecurityLand #CyberWatch #XenServer #CVE #VirtualizationSecurity #Windows #Vulnerability

https://www.security.land/three-lines-of-code-that-could-compromise-your-entire-virtual-infrastructure/

"🚨 Critical #VMware Vulnerabilities Alert! 🚨 - Patch Now to Shield Your Virtual Environments πŸ›‘οΈπŸ’»"

VMware has patched multiple critical vulnerabilities across its #VMware_ESXi, #VMware_Workstation, and #VMWare_Fusion products, including #CVE-2024-22252, #CVE-2024-22253, #CVE-2024-22254, and #CVE-2024-22255. These flaws span from use-after-free issues in both XHCI and UHCI USB controllers to an out-of-bounds write in ESXi, potentially allowing malicious actors with local administrative privileges to execute code or leak sensitive memory information from the host system. The severity of these vulnerabilities cannot be overstated, as they could lead to sandbox escape and unauthorized code execution on the host machine. This is especially worrisome when CVE-2024-22254 would be chained with CVE-2024-22252. VMware users are strongly urged to apply these updates to mitigate the risks associated with these vulnerabilities.

Ensure your systems are patched to avoid becoming a foothold for attackers.

Sources: VMware Security Advisory, The Hacker News

Tags: #Cybersecurity #InfoSec #Patching #VirtualizationSecurity #VulnerabilityManagement #InfosecExchange πŸŒπŸ”‘πŸ›‘οΈ

The Internet Drafts and Security Issues Around a Virtual Private Network Infrastructure http://feedproxy.google.com/~r/infosecResources/~3/1D7rP8uDvBs/ #VirtualizationSecurity
The Internet Drafts and Security Issues Around a Virtual Private Network Infrastructure http://feedproxy.google.com/~r/infosecResources/~3/1D7rP8uDvBs/ #VirtualizationSecurity