@Viss yeah, #Memenetes and #Docker are worse than manually fiddling with #VM|s in #ESXi and #KVM!
CISA: VMware ESXi flaw now exploited in ransomware attacks

CISA confirmed on Wednesday that ransomware gangs have begun exploiting a high-severity VMware ESXi sandbox escape vulnerability that was previously used in zero-day attacks.

BleepingComputer

@HopelessDemigod well, DM&P does pull off legacy designs in embedded and Industrial with their #Vortex86 series going down to #i486SX.

It's just that there are very few workloads that need absurdly-fast, single-threaded performance* and ain't designed for #POWER9 / #OpenPOWER or #s390x / #zArchitecture mainframes.

  • Like it's cheaper to just get an #embedded multicore with like 4x1,5GHz that maxes out at 15W and can be confogured down to 4W and will be overall more responsive and faster in any other workload.

And the few workloads that ain't multithreaded may be coaxed into it with like #vmware #ESXi mashing together multiple hardware threads into one superfast single thread, but I'd say that the vestigal compatibility of like an i7-6700K should potentially work fine, and worst-case one just setsit up to only use 1C/1T and constantly turbo-boost @ 91W TDP…

Vortex86 - Wikipedia

Moved yet another customer from #esxi to #proxmox today including #wireguard vpn tunnel to his new remote backup site aka home with #mikrotik in minutes! \o/
VMware ESXi zero-days likely exploited a year before disclosure

Chinese-speaking threat actors used a compromised SonicWall VPN appliance to deliver a VMware ESXi exploit toolkit that seems to have been developed more than a year before the targeted vulnerabilities became publicly known.

BleepingComputer
Hackers chineses exploraram falhas no VMware ESXi um ano antes da descoberta

Um novo relatório de segurança revelou que agentes de ameaça de língua chinesa utilizaram dispositivos VPN da SonicWall comprometidos para implantar um kit de f

TugaTech