Tag: vmware
-
Airstalk Malware Exploits AirWatch MDM for Covert C2 Communication
Security researchers have identified a sophisticated new malware family, Airstalk, that exploits VMware’s AirWatch API”, now known as Workspace ONE Unified Endpoint Management”, to establish covert command-and-control channels. The discovery represents a significant threat to evolution, with both PowerShell and .NET variants discovered in what researchers assess with medium confidence was a nation-state-sponsored supply chain…
-
Airstalk Malware Exploits AirWatch MDM for Covert C2 Communication
Security researchers have identified a sophisticated new malware family, Airstalk, that exploits VMware’s AirWatch API”, now known as Workspace ONE Unified Endpoint Management”, to establish covert command-and-control channels. The discovery represents a significant threat to evolution, with both PowerShell and .NET variants discovered in what researchers assess with medium confidence was a nation-state-sponsored supply chain…
-
CISA Alerts on Active Exploitation of VMware Tools and Aria Operations 0-Day
Tags: access, cisa, cve, cyber, cybersecurity, exploit, flaw, infrastructure, risk, tool, vmware, vulnerability, zero-dayThe Cybersecurity and Infrastructure Security Agency (CISA) has raised alarm over active exploitation of a critical privilege escalation vulnerability affecting Broadcom’s VMware Tools and VMware Aria Operations. Tracked as CVE-2025-41244, this 0-day flaw poses significant risk to organizations managing virtualized infrastructure, potentially allowing attackers to gain root-level access to compromised systems. CVE ID Vendor Affected…
-
CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
Tags: attack, china, cisa, cve, cybersecurity, exploit, flaw, hacker, infrastructure, kev, tool, vmware, vulnerability, zero-dayThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Broadcom VMware Tools and VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation in the wild.The vulnerability in question is CVE-2025-41244 (CVSS score: 7.8), which could be exploited by an attacker to attain…
-
U.S. CISA adds XWiki Platform, and Broadcom VMware Aria Operations and VMware Tools flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds XWiki Platform, and Broadcom VMware Aria Operations and VMware Tools flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added XWiki Platform, and Broadcom VMware Aria Operations and VMware Tools flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws…
-
CISA orders feds to patch VMware Tools flaw exploited by Chinese hackers
CISA has ordered federal agencies to patch a high-severity vulnerability in Broadcom’s VMware Aria Operations and VMware Tools software, exploited by Chinese hackers since October 2024. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-vmware-tools-flaw-exploited-since-october-2024/
-
Twist in Tesco vs. VMware case as Computacenter files claim against Broadcom, Dell
Tags: vmwareAs negotiations stalled, Broadcom feared Tesco no longer saw it as a long-term partner First seen on theregister.com Jump to article: www.theregister.com/2025/10/28/tesco_vs_broadcom_vmware_update/
-
Linux RATs on Windows: Ransomware Actors Target VMware Deployments
The Agenda ransomware group has evolved its attack methodology with a sophisticated technique that deploys Linux ransomware variants directly on Windows systems, challenging traditional endpoint security controls. The attack represents a significant tactical evolution in ransomware deployment strategies. Threat actors utilized WinSCP for secure file transfer to move Linux ransomware binaries onto Windows machines, then…
-
Linux RATs on Windows: Ransomware Actors Target VMware Deployments
The Agenda ransomware group has evolved its attack methodology with a sophisticated technique that deploys Linux ransomware variants directly on Windows systems, challenging traditional endpoint security controls. The attack represents a significant tactical evolution in ransomware deployment strategies. Threat actors utilized WinSCP for secure file transfer to move Linux ransomware binaries onto Windows machines, then…
-
VMware Certification: Your Next Career Power Move
Tags: vmwareVMware certification isn’t just about passing exams, it’s about mastering systems, proving expertise, and your career. Gain hands-on labs, discounts, and mentorship with VMUG Advantage to reach your next goal faster. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/vmware-certification-your-next-career-power-move/
-
VMware Releases Workstation Fusion 25H2 With Enhanced Features and OS Support
VMware has launched the latest versions of its desktop hypervisors, Workstation 25H2 and Fusion 25H2, bringing significant improvements to virtualization technology. These updates introduce a simplified versioning system, powerful new features, and expanded compatibility with modern operating systems and hardware. VMware has abandoned traditional version numbering like Workstation 17.6.x and Fusion 13.6.x in favor of…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
From Lab to Leadership: How VMware Certification Transformed My Career
From lab work to leadership, VMware certification can transform your IT career. Learn from VMware User Group (VMUG) how the VMUG Advantage can help you build real skills, gain confidence, and join a global IT community. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/from-lab-to-leadership-how-vmware-certification-transformed-my-career/
-
From Lab to Leadership: How VMware Certification Transformed My Career
From lab work to leadership, VMware certification can transform your IT career. Learn from VMware User Group (VMUG) how the VMUG Advantage can help you build real skills, gain confidence, and join a global IT community. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/from-lab-to-leadership-how-vmware-certification-transformed-my-career/
-
From Lab to Leadership: How VMware Certification Transformed My Career
From lab work to leadership, VMware certification can transform your IT career. Learn from VMware User Group (VMUG) how the VMUG Advantage can help you build real skills, gain confidence, and join a global IT community. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/from-lab-to-leadership-how-vmware-certification-transformed-my-career/
-
VMware Aria Operation und VMware Tools Day-Schwachstelle ermöglicht Root-Rechte in VMware-Umgebungen
First seen on security-insider.de Jump to article: www.security-insider.de/sicherheitsluecke-vmware-root-zugriff-unc5174-a-4b9124dea3a05463ef1032a5eac184ee/
-
PoC Released for VMware Workstation GuestHost Escape Vulnerability
NCC Group detailed a VMware Workstation guest-to-host escape achievable from a compromised VM via a logic flaw in virtual device handling that permits memory corruption and controlled code execution on the host process. The write-up shows a practical exploitation path from guest userland to host compromise, validating real-world risk. The attack requires execution inside a…
-
Breach Roundup: FTC Sues Sendit Over Kid’s Data Collection
Also, Cyberattack Disrupts Asahi’s Japan Operations, Halts Production. This week, FTC sued Sendit, another Harrods breach, Allianz data breach and a cyberattack disrupted Asahi’s Japan operations. WestJet disclosed data theft. Hackers targeted Kido Nursery chain, a VMware privilege escalation flaw was exploited as zero-day, DarkCloud infostealer resurfaced. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/breach-roundup-ftc-sues-sendit-over-kids-data-collection-a-29625
-
Breach Roundup: FTC Sues Sendit Over Kid’s Data Collection
Also, Cyberattack Disrupts Asahi’s Japan Operations, Halts Production. This week, FTC sued Sendit, another Harrods breach, Allianz data breach and a cyberattack disrupted Asahi’s Japan operations. WestJet disclosed data theft. Hackers targeted Kido Nursery chain, a VMware privilege escalation flaw was exploited as zero-day, DarkCloud infostealer resurfaced. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/breach-roundup-ftc-sues-sendit-over-kids-data-collection-a-29625
-
VMware-Schwachstellen: Aria, VMware-Tools, vCenter und NSX
Kurzer Nachtrag in VMware-Produkten wie VMware-Tools, dem VMware vCenter sowie NSX sind Schwachstellen bekannt geworden, die der Hersteller mit Updates patcht. Hier eine kurze Übersicht über diese Themen. VMware Aria und VMware-Tools Mit dem Sicherheitshinweis VMSA-2025-0015: VMware Aria Operations and … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/10/01/vmware-schwachstellen-vmware-tools-vcenter-und-nsx/
-
VMware-Schwachstellen: Aria, VMware-Tools, vCenter und NSX
Kurzer Nachtrag in VMware-Produkten wie VMware-Tools, dem VMware vCenter sowie NSX sind Schwachstellen bekannt geworden, die der Hersteller mit Updates patcht. Hier eine kurze Übersicht über diese Themen. VMware Aria und VMware-Tools Mit dem Sicherheitshinweis VMSA-2025-0015: VMware Aria Operations and … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/10/01/vmware-schwachstellen-vmware-tools-vcenter-und-nsx/
-
Broadcom patches VMware Zero-Day actively exploited by UNC5174
Broadcom patched six VMware flaws, including CVE-2025-41244, which has been exploited in the wild as a zero-day since mid-October 2024 by UNC5174 Broadcom addressed six VMware vulnerabilities, including four high-severity issues. One of these flaws, tracked as CVE-2025-41244 (CVSS score 7.8), allows local users to escalate to root via VMware Tools and Aria Operations. >>VMware…
-
Chinese hackers exploiting VMware zero-day since October 2024
Broadcom has patched a high-severity privilege escalation vulnerability in its VMware Aria Operations and VMware Tools software, which has been exploited in zero-day attacks since October 2024. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/chinese-hackers-exploiting-vmware-zero-day-since-october-2024/
-
VMware Certification Is Surging in a Shifting IT Landscape
VMware certification is surging as IT teams face hybrid infra, cloud complexity, & rising risks. See how VMUG Advantage helps practitioners & enterprises turn certification into stronger security & measurable value. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/vmware-certification-is-surging-in-a-shifting-it-landscape/
-
Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024
A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since mid-October 2024 by a threat actor called UNC5174, according to NVISO Labs.The vulnerability in question is CVE-2025-41244 (CVSS score: 7.8), a local privilege escalation bug affecting the following versions -VMware Cloud Foundation…
-
Broadcom fixes high-severity VMware NSX bugs reported by NSA
Broadcom has released security updates to patch two high-severity VMware NSX vulnerabilities reported by the U.S. National Security Agency (NSA). First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/broadcom-fixes-high-severity-vmware-nsx-bugs-reported-by-nsa/
-
VMware Tools and Aria 0-Day Under Active Exploitation for Privilege Escalation
Organizations using VMware hypervisors face an urgent threat as a local privilege escalation zero-day, tracked as CVE-2025-41244, is under active exploitation in the wild. Both VMware Tools and VMware Aria Operations’ Service Discovery Management Pack (SDMP) are affected, enabling unprivileged users to achieve root-level code execution without authentication. The vulnerability has been weaponized by the UNC5174…
-
VMware vCenter and NSX Flaws Allow Hackers to Enumerate Usernames
Broadcom released VMSA-2025-0016 to address three key vulnerabilities affecting VMware vCenter Server and NSX products. The vulnerabilities include an SMTP header injection in vCenter (CVE-2025-41250) and two distinct username enumeration flaws in NSX (CVE-2025-41251 and CVE-2025-41252). All three are rated in theImportantseverity range with CVSSv3 scores between 7.5 and 8.5. CVE ID Description CVSSv3 Affected…

