Virtual machines’ vulnerabilities. How hackers go beyond the virtual environment.