Articles in ghost

Security: How We Are Responding to the Ghost Vulnerability

Excuse us while while our Operations team do some Ghostbusting. A recently disclosed security flaw, given the name Ghost but officially known as CVE-2015-0235, has triggered our security response process. At this point is that we have evaluated the…

Continue reading »