
Datacenter Traces
Datacenter Traces In our research we use actual traces, collected from different production datacenters. We share these traces (sanitized) for the benefit of the research
Datacenter Traces In our research we use actual traces, collected from different production datacenters. We share these traces (sanitized) for the benefit of the research
Guardicore Labs team has uncovered a traffic manipulation and cryptocurrency mining campaign infecting a wide number of organizations in industries such as finance, education and
As this security flaw still exists and puts Azure environments at risk, we believe it’s important to continuously verify whether your environment is vulnerable. To do that we integrated Azure password harvesting capabilities into the Infection Monkey.
While researching the Azure Guest Agent, we’ve uncovered several security issues which have all been reported to Microsoft. This post will focus on a security design flaw in the VM Access plugin that may enable a cross platform attack impacting every machine type provided by Azure.
We are pleased to announce a new version of our Infection Monkey open source attack simulation tool with several significant enhancements. We first introduced the Infection Monkey in 2016 and have continuously developed and supported it. Part of what we did came from feedback we received from our community so thanks everyone for contributing!
Last week we published a post about a security design flaw we discovered in the Azure Guest Agent. An attacker can take advantage of this flaw to