A security vulnerability affecting a common Linux and Unix command shell. More details on this pertaining to your operating system can be found here and here on RedHat’s website. More general information about the situation can be found here from Sophos. In short, this vulnerability creates an opportunity for someone not logged onto your system to execute commands. Hostway moved proactively once
The recent leakage of celebrity photos put the spotlight on cloud application security.
In today’s business environment, there is a whole host of incidents that can interrupt a company’s daily operations. However, with constantly rising client demands, businesses cannot afford any stumbles, even for a moment.