virtualization
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113844/attacks-400x200.jpg)
Compromising Linux virtual machines via FFS Rowhammer attack
A group of Dutch researchers have demonstrated a variant of the Rowhammer attack that can be used to successfully compromise Linux virtual machines on cloud servers. The Flip …
Worldwide server virtualization market is reaching its peak
The worldwide x86 server virtualization market is expected to reach $5.6 billion in 2016, an increase of 5.7 percent from 2015, according to Gartner. Despite the overall …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113741/circle2-400x200.jpg)
WinMagic provides encryption of virtual machines running on IaaS platforms
At RSA Conference 2016 WinMagic introduced security software that encrypts virtual machines running on Infrastructure as a Service (IaaS) platforms. Addressing the growing …
Xen Project plugs critical host hijacking flaw, patch ASAP
The latest security update (XSA-145 through 153) for the popular Xen virtualization software fixes nine issues. Eight of them can lead to Denial of Service, but the ninth is …
Reflections on virtualization security and the VENOM vulnerability
Virtualization is undoubtedly a great IT tool that enables organizations to quickly run new instances of servers and workstations, helps isolate environments, and allows for a …
Major Xen update fixes over 20 vulns, including guest/host escape flaw
The newest version (v4.5.1) of popular hypervisor Xen has been released last week, and includes a bucketload of improvements and bug-fixes, including nearly 20 security …
Intel and VMware team up to provide advanced threat protection
At Infosecurity Europe 2015 Intel Security and VMware announced an integrated solution that leverages a Software-Defined Data Centre approach and the VMware NSX network …
11-year-old VM escape bug opens host machines to compromise
CrowdStrike researchers have recently discovered a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms, which could be …
![Waratek - RSA Conference 2015](https://img.helpnetsecurity.com/wp-content/uploads/2015/04/09194650/rsaconference_2015-waratek-400x200.jpg)
Waratek named Most Innovative Company
Waratek was named the “Most Innovative Company at RSA Conference 2015” as part of the 10th annual Innovation Sandbox Contest. Innovation Sandbox Contest promotes new …
![Red door](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195306/door_red-400x200.jpg)
Real-time traffic analysis and inventory of virtualized assets
Catbird Insight, a visualization solution for cloud and on-premise virtual environments that helps organizations rapidly discover, organize and analyze their virtual fabric to …
What pokes holes in virtual environments?
While most companies believe virtualization technology is a strategic priority, there are clear risks that need to be addressed. Ixia surveyed more than 430 targeted …
Five key IT security trends for 2015
Here’s a look at five key IT security trends and solutions for 2015. Rise in security breaches The current high level of security breaches, from the largest organization …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege