Just an engineer who specializes in incident handling and increases the cyber resilience of IT systems. I handled and advised on ransomware incidents around the world, contributing to the state-level cybersecurity standards and guidelines.
The most direct person you will meet in your life. Not a cybercelebrity.
The scale of ransomware campaigns targeting commercial infrastructure, including enterprise-scale ones, and the extent of damage proof that ransomware threat actors gained (some) competence in virtual environments based not only on Hyper-V (Microsoft), but also on ESXi (VMware). VMware-based environments were the last line of defence (and hope)o, as there was only a few ransomware that could be executed on the hypervisor and corrupt the VMDK files (on the VMFS, which is a different file system than NTFS, etc.). The recent esxiArgs campaign shows that an unpatched environment with a published management interface is a risk.