VMware VMware Security Blog
  • VMware Blogs
  • Communities
  • Tech Zone
  • RSS
  • Featured
  • Categories
    • Announcements
    • Executive Viewpoint
    • Multi-Cloud Security
    • Modern Apps Security
    • Workload Security
    • Endpoint Security
    • Network Security
    • Threat Analysis Unit
    • VMware Security Response Center
  • VMware Security
  • RSS
Why CISOs Should Invest More Inside Their Infrastructure
Announcements

Why CISOs Should Invest More Inside Their Infrastructure

Tom Gillis June 2, 2022 5 min read
Serpent - The Backdoor that Hides in Plain Sight
Threat Analysis Unit

Serpent - The Backdoor that Hides in Plain Sight

Threat Analysis Unit April 25, 2022 11 min read
How Not to Build a SOC
Executive Viewpoint

How Not to Build a SOC

Martin Holzworth April 18, 2022 14 min read
Podcast: Discussing the latest security threats and threat actors - Tom Kellermann (Virtually Speaking)
Executive Viewpoint

Podcast: Discussing the latest security threats and threat actors - Tom Kellermann (Virtually Speaking)

Editorial Staff April 13, 2022 1 min read

Stefano Ortolani

Threat Research Lead

Stefano Ortolani is Head of Threat Research and AI at Broadcom, also serving as Security Lead for “Intelligent Assist for VMware vDefend." Previously, he held roles including Staff Engineer 2 at VMware, Director of Threat Research at Lastline, and Security Researcher at Kaspersky Lab. Stefano earned his Ph.D. in Computer Science from VU University Amsterdam in 2013.

Author's Posts

Why Perimeter Firewall is Not Enough: Lessons from the GoAnywhere MFT Zero-Day
Advanced Threat Prevention

Why Perimeter Firewall is Not Enough: Lessons from the GoAnywhere MFT Zero-Day

Angelo Mirabella, Stefano Ortolani February 26, 2026 18 min read
Stacking Your Defenses: Integrating Advanced Threat Prevention and SIEM
SIEM

Stacking Your Defenses: Integrating Advanced Threat Prevention and SIEM

Stefano Ortolani, Aditya Gokhale November 12, 2025 25 min read
The Art of Managing Threat Feeds
Threat Intelligence

The Art of Managing Threat Feeds

Stefano Ortolani March 2, 2023 12 min read
How to Deploy a Threat Intelligence Platform in your Data Center 
Threat Intelligence

How to Deploy a Threat Intelligence Platform in your Data Center 

Stefano Ortolani January 5, 2023 12 min read
EmoLoad: Loading Emotet Modules without Emotet 
Threat Analysis Unit

EmoLoad: Loading Emotet Modules without Emotet 

Oleg Boyarchuk, Stefano Ortolani December 5, 2022 11 min read
ESXi-Targeting Ransomware: Tactics and Techniques (Part 2)
Threat Analysis Unit

ESXi-Targeting Ransomware: Tactics and Techniques (Part 2)

Oleg Boyarchuk, Giovanni Vigna, Stefano Ortolani October 28, 2022 22 min read
How to Replicate Emotet Lateral Movement
Threat Analysis Unit

How to Replicate Emotet Lateral Movement

Oleg Boyarchuk, Stefano Ortolani August 19, 2022 15 min read
Emotet Config Redux
Threat Analysis Unit

Emotet Config Redux

Oleg Boyarchuk, Stefano Ortolani May 25, 2022 8 min read
Hermetic Malware: Multi-component Threat Targeting Ukraine Organizations
Misc

Hermetic Malware: Multi-component Threat Targeting Ukraine Organizations

Giovanni Vigna, Oleg Boyarchuk, Stefano Ortolani March 4, 2022 14 min read
Log in the Shell: An Analysis of Log4Shell Exploitation
Threat Analysis Unit

Log in the Shell: An Analysis of Log4Shell Exploitation

Stefano Ortolani, Sebastiano Mariani, Jason Zhang, Giovanni Vign ... Stefano Ortolani, Sebastiano Mariani, Jason Zhang, Giovanni Vigna December 14, 2021 11 min read

Posts pagination

1 2 Next