IT Security practitioner with a deep interest in Cyber Security, Compliance, Cloud Security, Penetration testing, Big Data Analytics, Cloud Automation (Puppet), Computer Forensics toolkits, Converged and Hyper-Converged infrastructure. In my free time, I like riding my motorcycle on curvy roads while keeping an eye out for wildlife which might cut my ride short
Tuesday, January 27, 2015
Old exploits new names aka Ghost vulnerabilities in Linux distros
Ghost vulnerability affecting Linux distributions remind us that we need to perform static code analysis and also keep fixing old code. We keep finding memory management exploits in code which should be already been fixed for example glibc. More on this vulnerability found here.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment