- Network Status
- Contact Us
- Chat Now
You may have heard about a vulnerability in Bash, a command processor that allows a user to conduct actions through a command-line interface for Linux environments. The vulnerability, called Shellshock, does not allow privileged escalation, but if exploited, a threat actor with access to a Linux server can run arbitrary commands.
To date, our security operations and support teams have already gone through their processes to assess the vulnerability and establish successful security measures. As is common practice, we will continue conducting active, routine scans of our cloud environment.
As you know, we take security seriously. If you have any questions, please do not hesitate to contact us. Thank you for being our customer. We do not take your trust in us lightly.