A Rogue VM is a virtual machine that is setup and deployed without authorization. From this machine a variety of other attacks can be launched, data intercepted or the machine can be used for nefarious purposes like an unauthorized cryptominer.
Privileged container escape is a problem with containerization, but containers are fundamentally different from virtualization of infrastructure and hypervisors. Containers share the host system’s kernel but provide isolated user spaces for the container's processes and dependencies. Containers can run on a virtualized infrastructure or "bare-metal" infrastucture.
Wikipedia
Hyperjacking is an attack in which a hacker takes malicious control over the hypervisor that creates the virtual environment within a virtual machine (VM) host. The point of the attack is to target the operating system that is below that of the virtual machines so that the attacker's program can run and the applications on the VMs above it will be completely oblivious to its presence.