Its name stands for Virtualized Environment Neglected Operations Manipulation and VENOM is a particularly apt term given that it can be exploited to allow attackers to execute code on a host computer from a virtual machine, and also access other VMs that are running on the same host. This is especially serious because of the popularity of server consolidation, whereby companies and individuals save on hardware costs by running multiple VMs on the same host OS.
About The Author
Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.