VMware VMware Security Blog
  • VMware Blogs
  • Communities
  • Tech Zone
  • RSS
  • Featured
  • Categories
    • Announcements
    • Executive Viewpoint
    • Multi-Cloud Security
    • Modern Apps Security
    • Workload Security
    • Endpoint Security
    • Network Security
    • Threat Analysis Unit
    • VMware Security Response Center
  • VMware Security
  • RSS
Why CISOs Should Invest More Inside Their Infrastructure
Announcements

Why CISOs Should Invest More Inside Their Infrastructure

Tom Gillis June 2, 2022 5 min read
Serpent - The Backdoor that Hides in Plain Sight
Threat Analysis Unit

Serpent - The Backdoor that Hides in Plain Sight

Threat Analysis Unit April 25, 2022 11 min read
How Not to Build a SOC
Executive Viewpoint

How Not to Build a SOC

Martin Holzworth April 18, 2022 14 min read
Podcast: Discussing the latest security threats and threat actors - Tom Kellermann (Virtually Speaking)
Executive Viewpoint

Podcast: Discussing the latest security threats and threat actors - Tom Kellermann (Virtually Speaking)

Editorial Staff April 13, 2022 1 min read

Oleg Boyarchuk

Author's Posts

How to Detect PoshC2 PowerShell Implants
Threat Analysis Unit

How to Detect PoshC2 PowerShell Implants

Oleg Boyarchuk March 24, 2023 18 min read
Detection of Lateral Movement with the Sliver C2 Framework 
Threat Analysis Unit

Detection of Lateral Movement with the Sliver C2 Framework 

Oleg Boyarchuk January 13, 2023 9 min read
EmoLoad: Loading Emotet Modules without Emotet 
Threat Analysis Unit

EmoLoad: Loading Emotet Modules without Emotet 

Oleg Boyarchuk, Stefano Ortolani December 5, 2022 11 min read
ESXi-Targeting Ransomware: Tactics and Techniques (Part 2)
Threat Analysis Unit

ESXi-Targeting Ransomware: Tactics and Techniques (Part 2)

Oleg Boyarchuk, Giovanni Vigna, Stefano Ortolani October 28, 2022 22 min read
ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1)
Threat Analysis Unit

ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1)

Giovanni Vigna, Oleg Boyarchuk September 28, 2022 21 min read
How to Replicate Emotet Lateral Movement
Threat Analysis Unit

How to Replicate Emotet Lateral Movement

Oleg Boyarchuk, Stefano Ortolani August 19, 2022 15 min read
Emotet Config Redux
Threat Analysis Unit

Emotet Config Redux

Oleg Boyarchuk, Stefano Ortolani May 25, 2022 8 min read
Emotet Moves to 64 bit and Updates its Loader
Threat Analysis Unit

Emotet Moves to 64 bit and Updates its Loader

Oleg Boyarchuk, Jason Zhang, Stefano Ortolani May 16, 2022 9 min read
Emotet C2 Configuration Extraction and Analysis
Threat Analysis Unit

Emotet C2 Configuration Extraction and Analysis

Oleg Boyarchuk, Jason Zhang March 29, 2022 39 min read
Hermetic Malware: Multi-component Threat Targeting Ukraine Organizations
Misc

Hermetic Malware: Multi-component Threat Targeting Ukraine Organizations

Giovanni Vigna, Oleg Boyarchuk, Stefano Ortolani March 4, 2022 14 min read

Posts pagination

1 2 Next