A recently discovered hole in the security of the Bourne-Again Shell (bash) has the majority of Unix/Linux (including OS X) admins sweating bullets. You should be, too - attackers are actively exploiting the vulnerability on un-patched web servers, network services and daemons that use shell scripts with environment variables (this can include network equipment, industrial devices, etc.). So, what can you do to protect your environment?
Join us for a live demo covering:
- Insights from Jaime Blasco, Director of AlienVault Labs on how attackers are exploiting this vulnerability
- Practical tips to minimize your exposure to attack
- How AlienVault USM can detect the bash vulnerability, and alert you of active attacks
Watch It Now!
Director of AlienVault Labs
At AlienVault, Jaime manages the Lab and runs the Vulnerability Research Team. Prior to working in the AlienVault lab he founded startups (Eazel, Aitsec) working on web application security, source code analysis and incident response. His background stems from a number of years working in vulnerability management, malware analysis and security researching. When he’s not hunting down the bad guys, and alerting the good ones, he’s a guest speaker or lecturer at hacking conferences such as Rooted Con, OWASP. Recently he ran a Cyber Warfare conference for the Head of Defense in Spain demonstrating attacks in real time and showing how to defend against them. He’s also a regular contributor to Hakin9 and InSecure magazine. Jaime also advises government on emerging threats.