An organization's internal department frequently uses a cloud provider to store large amounts of sensitive data. A threat actor has deployed a virtual machine to attack another virtual machine to gain access to the data. Through the use of the cloud host's hypervisor, the threat actor has escalated the access rights. Which of the following actions would be BEST to remediate the vulnerability the attacker has used to exploit the system?
novolyus
1 year, 5 months agoGwatto
1 year, 5 months agoPavel019846457
1 year, 5 months agoheinzelrumpel
1 year, 9 months agonovolyus
1 year, 5 months agouday1985
1 year, 7 months agoPOWNED
1 year, 9 months agosus1801
2 years agokiduuu
2 years agoHenry88
2 years, 1 month ago2Fish
2 years, 1 month agoEric1234
2 years, 2 months agoNickDrops
2 years, 2 months agocatastrophie
2 years, 2 months agoTKW36
2 years, 3 months ago2Fish
2 years, 1 month agoiking
2 years, 4 months agoiking
2 years, 4 months agoiking
2 years, 4 months agocatastrophie
2 years, 2 months agoDavidC5
2 years, 6 months agoTag
2 years, 6 months agoR00ted
2 years, 6 months agoAdrian831
2 years, 6 months agoAaronS1990
2 years, 2 months agosh4dali
2 years, 7 months ago