Get a Pentest and security assessment of your IT network.

Cyber Security

Several Factors Mitigate VENOM’s Utility for Attackers

Proof of concept code exploiting the VENOM vulnerability has surfaced. The vulnerability could lead to an attacker escaping the confines of the virtual machine and gaining access to the host, and in turn, all of the other virtual instances running on that server. Experts caution that users shouldn’t buy into all the hyperbole about the vulnerability, especially comparisons to Heartbleed and other Internet-wide bugs. The bug was found by researchers at CrowdStrike and lives in the virtual floppy disk controller of QEMU, an open-source virtualization package.

Source: https://threatpost.com/several-factors-mitigate-venoms-utility-for-attackers/112841/

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation