You may have heard about a vulnerability in Bash, a command processor that allows a user to conduct actions through a command-line interface for Linux environments. The vulnerability, called Shellshock, has a bug that does not allow privileged escalation. But if exploited, a threat actor with access to a Linux server can run arbitrary commands.
To date, our security operations and support teams have already gone through their processes to assess the vulnerability. Also we have successful security measures established. As is common practice, we will continue conducting active, routine scans of our cloud environment.
As you know, we take security seriously. So, if you have any questions, please do not hesitate to contact us. Thank you for being our customer. And know that we do not take your trust in us lightly.
For more updates and articles on security, stay connect with us on Facebook.