How can a typical researcher protect against VM escapes?
I read a similar question here on how large companies protect themselves and became intrigued about how this would transfer over to less significant operation (ie security researcher, small company, etc).
I recognize that malware analysis … Continue reading How can a typical researcher protect against VM escapes?