Feb. 10, 2023, 9:10 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news


Multiple warnings from several of the biggest cybersecurity agencies in the world over the last week have not motivated some organizations to patch a security issue being exploited as part of the ESXiArgs ransomware campaign.


Cybersecurity firm Rapid7 said its Project Sonar telemetry showed that 18,581 VMware ESXi servers are still vulnerable to CVE-2021-21974 — a 2-year-old vulnerability being exploited by unknown cybercriminals. VMware issued a patch soon after the bug was discovered.


The situation has stayed in the …

bug campaign cve cve-2021-21974 cybercriminals cybersecurity esxi esxiargs esxiargs ransomware exploited issue old organizations patch project project sonar ransomware rapid7 security servers sonar telemetry vmware vmware esxi vmware esxi servers vulnerability vulnerable world

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

DevSecOps Engineer

@ LinQuest | Beavercreek, Ohio, United States

Senior Developer, Vulnerability Collections (Contractor)

@ SecurityScorecard | Remote (Turkey or Latin America)

Cyber Security Intern 03416 NWSOL

@ North Wind Group | RICHLAND, WA

Senior Cybersecurity Process Engineer

@ Peraton | Fort Meade, MD, United States

Sr. Manager, Cybersecurity and Info Security

@ AESC | Smyrna, TN 37167, Smyrna, TN, US | Santa Clara, CA 95054, Santa Clara, CA, US | Florence, SC 29501, Florence, SC, US | Bowling Green, KY 42101, Bowling Green, KY, US