Home / Blog / All Blog Posts

Alert Logic Blogs 

Shellshock Vulnerability: Impact, Analysis, and Protection

Shellshock Vulnerability: Impact, Analysis, and Protection

The Unix Bash (Bourne Again Shell) shell – known as “Shellshock” or “Bash Bug” is a vulnerability affects a wide range of operating systems (Unix, Linux, OSX), routers, and other technologies, making many of the systems are used on a daily basis vulnerable to attacks.

POODLE — The Man-in-the-Middle Attack on SSLv3

First it was Heartbleed, then Shellshock, now POODLE…while the names are intriguing, the focus of these security vulnerabilities is on how broad the exposure is, what is required to build the right protection, and how long the exposure may have been exploited for.

ISEO and Implications for Proactive Cybersecurity

At the White House Summit on Cybersecurity and Consumer Protection, President Barack Obama signed an Information Sharing Executive Order to promote cybersecurity information sharing in the private sector.

The History and Evolution of Cybercrime

The History and Evolution of Cybercrime

There are — and always have been — many forms of cybercrime, all of which carry the common thread of commerce. As long as there has been commerce, there has been crime, both in the general sense as well as cybercrime specifically. Think of the highwaymen on the 17th-century roads in England, or the pirates hunting down and capturing Spanish Galleons and their precious cargos of gold.

Ready to Protect Your Company with Alert Logic?