Changes to Apple Silicon put the @AsahiLinux project at odds with adding support for the M4 chips
https://www.linux-magazine.com/Online/News/Asahi-Linux-Runs-into-Issues-with-M4-Support?utm_source=MLM
#Linux #Asahi #AppleSilicon #M4 #XNU #hypervisor
Changes to Apple Silicon put the @AsahiLinux project at odds with adding support for the M4 chips
https://www.linux-magazine.com/Online/News/Asahi-Linux-Runs-into-Issues-with-M4-Support?utm_source=MLM
#Linux #Asahi #AppleSilicon #M4 #XNU #hypervisor
Proxmox VE 8.4 released on Debian 12.10 base with Linux Kernel 6.8.12, live migration support with mediated devices, API for third-party backup solutions, Virtiofs directory passthrough
https://proxmox.com/en/about/company-details/press-releases/proxmox-virtual-environment-8-4
Quitting an Intel x86 Hypervisor
What do you miss in #Proxmox or #XCPng?
My customers often told me, that when migrating from #VMware based setups, they would miss something like #DRS. As a result I published #ProxLB as a load balancer. Now, I do the same for #DPM and also some other things. What do you miss or what stops you or your business from switching to Proxmox or XCPng?
To date, I have published 15 articles (1045 pages) with the strict goal of helping the cybersecurity community.
ERS (439 pages, so far):
[+] ERS 05: https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/
[+] ERS 04: https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/
[+] ERS 03: https://exploitreversing.com/2025/01/22/exploiting-reversing-er-series-article-03/
[+] ERS 02: https://exploitreversing.com/2024/01/03/exploiting-reversing-er-series-article-02/
[+] ERS 01: https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series/
MAS (606 pages -- finished):
[+] MAS 10: https://exploitreversing.com/2025/01/15/malware-analysis-series-mas-article-10/
[+] MAS 09: https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/
[+] MAS 09: https://exploitreversing.com/2024/08/07/malware-analysis-series-mas-article-08/
[+] MAS 07: https://exploitreversing.com/2023/01/05/malware-analysis-series-mas-article-7/
[+] MAS 06: https://exploitreversing.com/2022/11/24/malware-analysis-series-mas-article-6/
[+] MAS 05: https://exploitreversing.com/2022/09/14/malware-analysis-series-mas-article-5/
[+] MAS 04: https://exploitreversing.com/2022/05/12/malware-analysis-series-mas-article-4/
[+] MAS 03: https://exploitreversing.com/2022/05/05/malware-analysis-series-mas-article-3/
[+] MAS 02: https://exploitreversing.com/2022/02/03/malware-analysis-series-mas-article-2/
[+] MAS 01: https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/
The blog home page is: https://exploitreversing.com/
I will be back in a few months with the next articles in the Exploiting Reversing series, which will focus on vulnerability and exploitation, once I have laid all the necessary groundwork. I'm currently taking a break from writing to focus on research.
Enjoy reading and have an excellent day.
#Xbox 360 modders have discovered a new way to get homebrew apps and games running on the console. A new software-only exploit known as #BadUpdate allows you to use a #USB key to hack past #Microsoft #Hypervisor protections and run unsigned #code and #games https://github.com/grimdoomer/Xbox360BadUpdate
The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:
https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/
I would like to thank Ilfak Guilfanov @ilfak and Hex-Rays SA @HexRaysSA for their constant and uninterrupted support, which have helped me write these articles.
I hope you enjoy reading it and have an excellent day.
The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:
https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/
I would like to thank Ilfak Guilfanov @ilfak and Hex-Rays SA @HexRaysSA for their constant and uninterrupted support, which have helped me write these articles.
I hope you enjoy reading it and have an excellent day.
#Xen 4.20.0 has been released (#XenProject / #XenProjectHypervisor / #XenHypervisor / #Hypervisor / #Virtualization / #LinuxFoundation) https://xenproject.org/
I'm currently looking for people with low level #firmware, #hypervisor and/or #virtio experience. Flexible contract or full time possibility. My DMs are open for CVs, ideally with pointers to #upstream contributions. #getfedihired #fedihire #jobs
Xen 4.20 open-source type-1 hypervisor brings Arm LLC coloring, AMD Zen 5 support, Intel EPT Paging-Write, and more.
https://linuxiac.com/xen-4-20-hypervisor-brings-amd-zen-5-support/
Hacking the Xbox 360 Hypervisor:
01. Hacking the Xbox 360 Hypervisor Part 1: System Overview: https://icode4.coffee/?p=1047
02. Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit: https://icode4.coffee/?p=1081
Hacking the Xbox 360 Hypervisor:
01. Hacking the Xbox 360 Hypervisor Part 1: System Overview: https://icode4.coffee/?p=1047
02. Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit: https://icode4.coffee/?p=1081
Low Latency (<2ms) process execution in a VM via a hypervisor, not a sandbox!?
I'm not going to pretend to understand all the limitations of a sandbox but I believe that we have solid hypervisors.
What you need to do to download VMWare Fusion and Workstation for free.
Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit — https://icode4.coffee/?p=1081
#HackerNews #Hacking #Xbox360 #Hypervisor #BadUpdate #Exploit #GamingSecurity
@MsDropbear42 the type-1/type-2 terminology should probably be retired at this point. #kvm exhibits a lot of type-2 behaviour (e.g. guests are processes to the kernel) although being #Linux it accesses the hardware directly. #Xen looks more like a typical type-1 layered #hypervisor although a lot of #hardware management is delegated to the #dom0 guest. And that's before you look at the architectural differences between for example #x86 and #arm (with and without #vhe).
Added 𝗨𝗣𝗗𝗔𝗧𝗘 𝟯 [UPDATE 3] to 𝗙𝗿𝗲𝗲𝗕𝗦𝗗 𝗕𝗵𝘆𝘃𝗲 𝗩𝗶𝗿𝘁𝘂𝗮𝗹𝗶𝘇𝗮𝘁𝗶𝗼𝗻 [FreeBSD Bhyve Virtualization] article.
https://vermaden.wordpress.com/2023/08/18/freebsd-bhyve-virtualization/
Added 𝗨𝗣𝗗𝗔𝗧𝗘 𝟯 [UPDATE 3] to 𝗙𝗿𝗲𝗲𝗕𝗦𝗗 𝗕𝗵𝘆𝘃𝗲 𝗩𝗶𝗿𝘁𝘂𝗮𝗹𝗶𝘇𝗮𝘁𝗶𝗼𝗻 [FreeBSD Bhyve Virtualization] article.
https://vermaden.wordpress.com/2023/08/18/freebsd-bhyve-virtualization/