Feb. 6, 2023, 12:06 p.m. | Zeljka Zorz

Help Net Security www.helpnetsecurity.com

Late last week, unknown attackers launched a widespread ransomware attack hitting VMware ESXi hypervisors via CVE-2021-21974, an easily exploitable vulnerability that allows them to run exploit code remotely, without prior authentication. Patches for CVE-2021-21974, a vulnerability in ESXi’s OpenSLP service, have been provided by VMware two years ago, and this attack has revealed just how many servers are out there are still unpatched, with the SLP service still running and the OpenSLP port (427) still … More →


The post …

attack attackers authentication bug canada censys cloud security code cve cve-2021-21974 don't miss esxi europe exploit exploit code france hot stuff hypervisors old ovhcloud patches ransomware ransomware attack run servers service slp unpatched usa virtualization vmware vmware esxi vmware esxi hypervisors vmware esxi servers vulnerability

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Penetration Tester

@ Resillion | Bengaluru, India

Senior Backend Software Engineer (Java) - Privacy Engineering (Open to remote across ANZ)

@ Canva | Sydney, Australia

(Senior) Information Security Professional (w/m/d)

@ IONOS | Deutschland - Remote

Information Security (Incident Response) Intern

@ Eurofins | Katowice, Poland

Game Penetration Tester

@ Magic Media | Belgrade, Vojvodina, Serbia - Remote