- This portable speaker beats the Bose SoundLink Max in key ways - for $200 less
- UK AI Research Under Threat From Nation-State Hackers
- Why your old Warner Bros. DVDs aren't playable anymore - and a potential fix
- La frustración con TI cuesta a las empresas más de 100 millones de dólares al año
- Most AI voice cloning tools aren't safe from scammers, Consumer Reports finds
VMware ESXi gets critical patches for in-the-wild virtual machine escape attack

Broadcom released emergency patches for its VMware ESXi, Workstation, and Fusion products to fix three vulnerabilities that can lead to virtual machine escape and are actively being exploited by attackers. Products that include VMware ESXi, such as VMware vSphere, VMware Cloud Foundation, and VMware Telco Cloud Platform, are also impacted.
VMware products, especially the ESXi enterprise hypervisor, are high-value targets and have been repeatedly attacked by cybercriminal and cyberespionage groups over the years. Hypervisors, or virtual machine monitors, are the virtualization software used to create and run virtual machines.
Virtual machine escapes, in which an attacker with access to a guest VM can take over the entire host server, are the most serious hypervisor attacks because they violate the core security principle that virtualization is supposed to offer: complete isolation between guest operating systems and the host OS.