Get a Pentest and security assessment of your IT network.

Cyber Security

Several Factors Mitigate VENOM’s Utility for Attackers

Proof of concept code exploiting the VENOM vulnerability has surfaced. The vulnerability could lead to an attacker escaping the confines of the virtual machine and gaining access to the host, and in turn, all of the other virtual instances running on that server. Experts caution that users shouldn’t buy into all the hyperbole about the vulnerability, especially comparisons to Heartbleed and other Internet-wide bugs. The bug was found by researchers at CrowdStrike and lives in the virtual floppy disk controller of QEMU, an open-source virtualization package.

Source: https://threatpost.com/several-factors-mitigate-venoms-utility-for-attackers/112841/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security