WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

357

Archive: https://archive.today/SS8da

From the post:

>Chinese-linked cybercriminals were sitting on a working VMware ESXi hypervisor escape kit more than a year before the bugs it relied on were made public. That's according to researchers at Huntress, who this week published a breakdown of an intrusion they observed in December 2025 in which a "sophisticated" toolkit was used to break out of virtual machines and target the ESXi hypervisor itself. The security firm says parts of the code point to development starting as early as February 2024 – a full year before VMware disclosed the bugs in March 2025.

Archive: https://archive.today/SS8da From the post: >>Chinese-linked cybercriminals were sitting on a working VMware ESXi hypervisor escape kit more than a year before the bugs it relied on were made public. That's according to researchers at Huntress, who this week published a breakdown of an intrusion they observed in December 2025 in which a "sophisticated" toolkit was used to break out of virtual machines and target the ESXi hypervisor itself. The security firm says parts of the code point to development starting as early as February 2024 – a full year before VMware disclosed the bugs in March 2025.

Be the first to comment!