Zeitpunkt Nutzer Delta Tröts TNR Titel Version maxTL Mo 29.07.2024 00:00:28 175.237 +28 8.679.872 49,5 mas.to 4.2.10 500 So 28.07.2024 00:00:46 175.209 +38 8.670.674 49,5 mas.to 4.2.10 500 Sa 27.07.2024 00:00:00 175.171 +30 8.660.243 49,4 mas.to 4.2.10 500 Fr 26.07.2024 00:02:32 175.141 +52 8.648.424 49,4 mas.to 4.2.10 500 Do 25.07.2024 00:00:19 175.089 +37 8.642.185 49,4 mas.to 4.2.10 500 Mi 24.07.2024 00:01:42 175.052 +40 8.629.393 49,3 mas.to 4.2.10 500 Di 23.07.2024 00:01:07 175.012 +46 8.616.999 49,2 mas.to 4.2.10 500 Mo 22.07.2024 00:03:27 174.966 +26 8.604.863 49,2 mas.to 4.2.10 500 So 21.07.2024 00:00:59 174.940 +19 8.593.986 49,1 mas.to 4.2.10 500 Sa 20.07.2024 00:04:58 174.921 0 8.584.355 49,1 mas.to 4.2.10 500
trends (@trendsbot) · 07/2023 · Tröts: 29.286 · Folger: 127
Mo 29.07.2024 21:44
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption | Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2024/07/29/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption/
Microsoft Security researchers have observed a vulnerability used by various ransomware operators to get full administrative access to domain-joined ESXi hypervisors and encrypt the virtual machines running on
---
64 uses from 58 accounts #toplink
[Öffentlich] Antw.: 0 Wtrl.: 0 Fav.: 0 · via trends