News

NEWS ANALYSIS: The newly discovered GHOST vulnerability isn't really new, but it places renewed emphasis on how open-source security practices need to improve.
Patches for GHOST, a critical vulnerability in glibc, the Linux GNU C Library, now are available through vendor communities for a variety of Linux server and desktop distributions. Qualys earlier this ...
GHOST, a critical Linux security hole, is revealed This security hole, which impacts many older versions of Linux and some current ones, should be patched as soon as possible.
Ghost Security unveils Reaper: an AI-driven, open-source tool launching Halloween to redefine precision in application security testing.
The vulnerability, nicknamed “Ghost,” is in the GNU C Library known as glibc, according to security vendor Qualys, which disclosed the issue on Tuesday as many Linux distributions released ...
Security experts are warning of yet another potentially major vulnerability in Linux systems, which could allow hackers to take remote control of a system. The flaw – assigned CVE-2015-0235 – was ...
A critical vulnerability in a core Linux library can be exploited remotely through WordPress and likely other PHP applications to compromise Web servers.
Press Release Ghost Security announces the release of Reaper, the first open-source Application Security Testing framework powered by Agentic AI. Reaper combines human expertise with AI driven ...