Guest Author
Security researchers discovered another security hole in Linux systems. The GHOST vulnerability might leave your system open to hackers.
The GHOST name derives from the issue with the GetHOST functions. Hackers access your system Through gethostbyname functions hackers can access a remote shell in Linux and seize control of your system without system credentials.
The severity of the vulnerability warrants immediate attention. Ubuntu, different versions of RHEL, CentOS 6 and 7, and Debian 7 are vulnerable to the problem. However, they all now supply patches. There is only one thing left for you to do. Go update and reboot your Linux system with the patch updates.
Qualys, a cloud security company, first discovered and announced the problem. For more information on the vulnerability, read about the original announcement at the Qualys blog.
subscribe by email
Stay Ahead
Related Posts
-
Cyber Security
The Most Common Phishing Attacks and How to Spot Them
January 17, 2025
-
Cyber Security
6 Tips for Keeping Your Devices Safe While Traveling
December 24, 2024
-
Cyber Security
The Benefits of Earning the EC-Council Certified Threat Intelligence Analyst (CTIA) Certification
September 13, 2024