Ghost Vulnerability Image Post

Early in 2015, the Qualys security research team discovered an extremely critical vulnerability in the Linux GNU C Library (glibc for short). The vulnerability, dubbed “GHOST,” would allow hackers to take control of a system remotely without requiring them to provide any security credentials. By accessing the glibc, a hacker… Read More

What is DDoS?

 

We’ve all been there – that moment when your server’s traffic figures begin to spike. The steady rise in volume for what can feel like days with no sign of slowing down. Phone calls start coming in – customers having problems with your website. The server’s load time steadily inches… Read More