The Bash Vulnerability: Practical Tips to Secure your Environment
Join our partner Alien Vault in a recorded webcast on the Bash Vulnerability and practical guides to protect against it.
A recently discovered hole in the security of the Bourne-Again Shell (bash) has the majority of Unix/Linux (including OS X) admins sweating bullets. You should be, too – attackers are actively exploiting the vulnerability on un-patched web servers, network services and daemons that use shell scripts with environment variables (this can include network equipment, industrial devices, etc.). So, what can you do to protect your environment?