You searched for hypervisor/ | SC Media

Your search for hypervisor/ returned 13 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Doug Olenick remove

Your search for hypervisor/ returned 13 results

Sort Results:

Relevant Recent
Executive Insight, Opinion

Application isolation and virtualization provide a false sense of cybersecurity

A recently discovered critical vulnerability presents yet another case study for the shortcomings of the isolation/virtual machine model for cybersecurity. The vulnerability, CVE-2019-14378, has a severity of 8.8, and was first published in the National Vulnerability Database on July 29th, 2019. The vulnerability affects QEMU, the popular open source machine emulator and virtualizer. Short for…
Executive Insight, Opinion

Application isolation and virtualization provide a false sense of cybersecurity – It’s time for a better solution

A recently discovered critical vulnerability presents yet another case study for the shortcomings of the isolation/virtual machine model for cybersecurity. The vulnerability, CVE-2019-14378, has a severity of 8.8, and was first published in the National Vulnerability Database on July 29th, 2019. The vulnerability affects QEMU, the popular open source machine emulator and virtualizer. Short for…
VMware advisory warns users to patch critical issue in product
Security News, Vulnerabilities

VMware patches five security vulnerabilities

VMware pushed out security updates covering five vulnerabilities that if exploited could lead to information disclosure or a denial of service situation. The important-rated vulnerabilities are CVE-2019-5540, CVE-2019-5541 and CVE-2019-5542 and impact VMware Workstation Pro / Player and VMware Fusion Pro/Fusion. CVE-2019-5541 covers an out-of-bounds write vulnerability in e1000e virtual network adapter that could lead…
Vulnerabilities

SEVered attack able to defeat AMD SEV

Several German researchers have shown a proof of concept attack indicating virtual machines using AMD's secure encrypted virtualization (SEV) are susceptible to being hacked.
Security News, Vulnerabilities

VMware issues advisory for a DoS vulnerability

VMware issued a security advisory for an “important-rated” denial of service (DoS) vulnerability. The issue, CVE-2018-6977, affects VMware’s vSphere ESXi, Workstation Pro/Player and Fusion Pro is due to the ability to create an infinite loop in a 3D-rendering. This can be accomplished by an attacker, who already has normal user privileges as a guest, who…
Security News, Vulnerabilities

Microsoft patches 22 critical flaws, four zero days on June Patch Tuesday

Microsoft’s June Patch Tuesday release covered 88 CVE, including 22 rated as critical and four that covered previously announced zero-day vulnerabilities. The zero-day issues, all are elevation of privilege issues, were tagged as top priority patches of the month by several cybersecurity executives, although the good news is none of the zero days, or other…
Security News, Vulnerabilities

Intel, industry scramble to mitigate ZombieLoad side-channel processor vulnerability

Four new CVEs that combine to create a vulnerability called ZombieLoad affecting Intel processors were made public today, which if left unpatched could leave a computer open to a side-channel attack allowing someone to bypass protections to read memory. The flaws, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091, impacted a number of companies with Apple, Google, Microsoft and…
Security News, Vulnerabilities

Microsoft Patch Tuesday update covers zero-day, 12 critical issues

October’s Patch Tuesday proved to be another big month for Microsoft which addressed 49 vulnerabilities, 12 critical, including a zero-day in the Microsoft JET database engine. The number of vulnerabilities patched this month is down from the 61 covered in September, but industry insiders were still able to point out some severe problems that were…
Google
Malware

Hackers find an evil use for SEO

Hackers distributing the Zeus Panda banking trojan have hit upon a new tactic that uses a combination of optimized SEO search terms along with compromised web servers and websites to ensnare their victims. Talos Cisco researchers Edmund Brumaghin, Earl Carter and Emmanuel Tacheau detailed the scheme which takes advantage of the fact that so many people…
Next post in Malware