Guest Author
Security researchers discovered another security hole in Linux systems. The GHOST vulnerability might leave your system open to hackers.
The GHOST name derives from the issue with the GetHOST functions. Hackers access your system Through gethostbyname functions hackers can access a remote shell in Linux and seize control of your system without system credentials.
The severity of the vulnerability warrants immediate attention. Ubuntu, different versions of RHEL, CentOS 6 and 7, and Debian 7 are vulnerable to the problem. However, they all now supply patches. There is only one thing left for you to do. Go update and reboot your Linux system with the patch updates.
Qualys, a cloud security company, first discovered and announced the problem. For more information on the vulnerability, read about the original announcement at the Qualys blog.
subscribe by email
Stay Ahead
Related Posts
-
Cyber Security
The Benefits of Earning the EC-Council Certified Threat Intelligence Analyst (CTIA) Certification
September 13, 2024
-
Cyber Security
Level Up Your Cybersecurity Career: The Benefits of CISM Training
August 15, 2024
-
Cyber Security
Cybersecurity Mindful Moments by Tara Lemieux
February 7, 2023