Experts in cybersecurity have uncovered that ransomware assaults aimed at ESXi platforms are using concealed channels to reroute traffic to command-and-control (C2) frameworks while operating discreetly.
“ESXi devices, left unchecked, are being more frequently utilized as a method for sustaining presence and entry point into business networks on a large scale,” Sygnia explained
“ESXi devices, left unchecked, are being more frequently utilized as a method for sustaining presence and entry point into business networks on a large scale,” Sygnia explained
