Ghost Vulnerability Image Post

Early in 2015, the Qualys security research team discovered an extremely critical vulnerability in the Linux GNU C Library (glibc for short). The vulnerability, dubbed “GHOST,” would allow hackers to take control of a system remotely without requiring them to provide any security credentials. By accessing the glibc, a hacker… Read More