Cybersecurity researchers have shed more light on a malicious loader that runs as a server and executes received modules in memory, laying...
An Instance refers to a server that is running our applications. Assume a single server is a single instance. Our cloud workloads...
Tech firm AMD issued a security guide to address two potential attacks against the Secure Encrypted Virtualization (SEV) solution, which keeps virtual...
RedHunt aims to be a one stop shop for all your threat emulation and threat hunting needs by integrating attacker’s arsenal as...
Around 40% of Microsoft’s Azure VMs now run Linux distributions, according to a tweet made by Microsoft Developer UK twitter account, ZDNet reports....
Bank Trojan called “Ursnif” using clever Trick to Evade sandbox Detection from the Virtual Machine Environment by using mouse movements. New Futures has...
In July 2017, security researchers have spotted a new version of the proficient Ursnif banking trojan that comes with a clever trick...
Hack worked by stitching together three separate exploits. Contestants at this year’s Pwn2Own hacking competition in Vancouver just pulled off an unusually...
Short Bytes: The security researchers at Palo Alto Networks have detected two versions of a malware similar to Shamoon which attacked 35,000...
Short Bytes: At its Ignite conference, Microsoft announced Windows Defender Application Guard for its Edge Browser. This technology will run Edge in...
Existing crypto software “wholly unequipped” to counter Rowhammer attacks. The world has seen the most unsettling attack yet resulting from the so-called Rowhammer...
Short Bytes: Microsoft’s investments in cloud-based open source technologies is now paying off. Thanks to the high demand for Linux on Azure, more...
If many endpoints’ traffic pass through the VM host, why not move security there, sort of catch “bad things” before they even...