
How vSphere Became a Target for Adversaries
The Defender's Advantage Podcast
00:00
How Attacks Unfold: Typical Incidents and Spy Tradecraft
Walkthrough of initial access paths, AD reconnaissance, vCenter backdoors, VM snapshot/exfil techniques, rapid ransomware execution, and espionage tactics like ghost VMs for long-term persistence.
Transcript
Play full episode