PSA: If you've lost your old ESXi perpetual key by updating to the latest version there is a workaround: Re-installing (not upgrade) the latest version 8.0U3e. Be sure to backup your VMs somewhere else! #esxi #vmware #sysadmin
Time to upgrade the BMC Firmware & BIOS just before installing the next version of #ESXi in the #homelab #HomeDC.
Thank you #supermicro for releasing updates & patches for motherboards released in 2017
FBI: Over 900 Organizations Hit by Play Ransomware, SimpleHelp Exploits and ESXi Variants Used
https://forum.hashpwn.net/post/642
#playcrypt #ransomware #RaaS #simplehelp #exploit #esxi #hashpwn #cybersecurity #news
Muss sagen, dass mich #proxmox schon öfter hängen gelassen hat, als es der olle HyperV und der #ESXi je getan hätten...
Alle zwei, drei Monate ist der einfach nicht mehr erreichbar und nur ein harter PowerOff bringt Linderung.
Die Frage ist jetzt: Hab ich Bock das zu debuggen oder reiß ich einfach alles ab und bau was anderes dahin?
A Question:
So i saw the #SANS #ransomware video ("Shaking up the Ransomware Game: Introducing Scattered Spider") where they mentioned that visibility into Hypervisors suck and that actors exploit #ESXi like there is no tomorrow. And thought i'd give my own defensive stuff a go.
My q is basically this:
Got to the point of finding esxcli software acceptance set --level=CommunitySupported
which would allow this, but then i had to create my own .vib package to install and there is where everything ended as i have no clue how to get something signed so, i'm asking if any of you guys have had any experience with this.
Kind of hard to make develop stuff for ESXi if you have to sign every release you want to test.
Tool for triage and analysis of ESXi logs, based on the timeline CSVs from QELP.
Produces:
- A combined timeline of Bash activity, logons and user activity
- A timeline of logon events by type, along with a user/IP logon timeline
- A summary of Bash history, network-tool usage and newly created users
https://github.com/cudeso/tools/tree/master/qelp-ir-triage-esxi #DFIR #Logs #esxi
偽物版 #KeePass のダウンロードが #ESXi の #ランサムウェア 感染に発展 | Codebook|Security News
オープンソースのパスワードマネージャーKeePassの #トロイの木馬 版に端を発するランサムウェア攻撃事例について、WithSecureの脅威インテリジェンスチームが報告 ...
https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/38884/
Fake #KeePass password manager leads to #ESXi #ransomware attack
Want to get rid of license costs of your #VMware environment? Switching to #Proxmox & looking for enterprise features like DRS? #ProxLB (opensource) has you covered!
With ProxLB you extend the features of your Proxmox cluster with DRS alike features including affinity & anti-affinity support, maintenance mode and soon also power management (DPM alike) and automated security patching!
https://github.com/gyptazy/ProxLB
#foss #debian #proxmoxve #esx #esxi #vsphere #homelab #enterprise #virtualization #kvm
Pwn2Own Berlin 2025 Day Two: researcher earned 150K hacking VMware ESXi
https://securityaffairs.com/177943/hacking/pwn2own-berlin-2025-day-two-researcher-earned-150k-hacking-vmware-esxi.html
#Infosec #Security #Cybersecurity #CeptBiro #Pwn2Own #Berlin2025 #VMware #ESXi
#Pwn2Own #Berlin 2025 Day Two: researcher earned 150K hacking #VMware #ESXi
https://securityaffairs.com/177943/hacking/pwn2own-berlin-2025-day-two-researcher-earned-150k-hacking-vmware-esxi.html
#securityaffairs #hacking
Migration from #ESXi / #VMware to #Proxmox #PVE has been made easier when the "Import Wizard" was introduced last year.
A nice walkthrough can be found here: https://www.storagereview.com/review/esxi-to-pve (from May 15, 2025)
Reference documentation: https://pve.proxmox.com/pve-docs/pve-admin-guide.html#qm_import_virtual_machines
From #VMware to #Proxmox VE: Step-by-Step Escape Plan
#ProxmoxVE has become a popular platform because of its #opensource nature. Using the built-in import tool, they go through the steps for migrating a #virtualmachine from a standalone VMware #ESXi server to Proxmox Virtual Environment.
You can shift workloads with minimal downtime and disruption by following the right preparation steps: verifying compatibility, cleaning up VMware Tools, and configuring import settings.
https://www.storagereview.com/review/esxi-to-pve
Bless me Father, I have sinned. I have downloaded & installed #ESXi 8.0 for my home lab.
#BSI: #VMware #ESXi: Mehrere Schwachstellen
Es bestehen mehrere Schwachstellen im VMware ESXi, VMware Workstation, VMware Fusion und VMware Cloud Foundation. Ein Angreifer kann diese Schwachstelle ausnutzen um Schadcode auszuführen, mehr Rechte zu erhalten und Daten zu stehlen.
https://wid.cert-bund.de/portal/wid/buergercert/details?uuid=dfb009fa-2fcf-4b95-b814-999aa6e3701e
Bueno, pues parece que ha vuelto una versión gratuita, aunque limitada, de #VMware y su #Esxi 8.
https://www.servethehome.com/broadcom-vmware-esxi-8-0u3e-now-has-a-free-version/