Skip to main content

Kevin Marks

Google confirms what I said to @leolaporte on TWiG “an attack running on one virtual machine was able to access the physical memory of the host machine, and through that, gain read-access to the memory of a different virtual machine on the same host.”
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html