LeadFistExpress (2494944) writes "Researchers have found, and demonstrated, how to use a virtual machine to steal the cryptographic keys from another virtual machine on the same host. This exploit could cause the attacking VM to have access to all communications from the victim VM. Could this revelation result in customers of public cloud providers to demand dedicated "air-gapped" hardware for their resources?" Link to Original Source
"There is no statute of limitations on stupidity."
-- Randomly produced by a computer program called Markov3.