Virtual-machine escape – in a Spectre v2 attack

A fresh research paper shows how complex vulnerabilities in CPUs can be leveraged in the most pertinent attacks on cloud-based systems.