Last Wednesday, news broke about a new zero-day vulnerability that has the web hosting community hissing. Originally discovered by security firm CrowdStrike, VENOM - or Virtualized Environment Neglected Operations Manipulation - is a buffer bug that lives in the virtual floppy drive code of the open source QEMU platform that could potentially allow hackers to compromise entire data centers by gaining access to virtual instances on the hosts within.
Just how serious is this CVE-2015-3456 security concern? Which computer virtualization platforms have been affected and which have released patches? Almost a week after detecting this flaw, are we right to equate its impact with Heartbleed or should we shed that comparison like an old layer of skin? Learn more about the VENOM virtualization vulnerability, how hackers can exploit it to gain access to virtual machines and what web hosts can do to mitigate the damage!