Red Hat mod_security Rules to Mitigate Shellshock
Red Hat has provided additional mod_security rules that can be utilized to help mitigate attacks from the Shellshock vulnerability. Please visit the Red Hat blog to learn about their supplementary rules. cPanel & WHM has also provided information about the Shellshock vulnerability. cPanel & WHM provides documentation to help add, edit, and modify mod_security rules as well.
Please sign in to leave a comment.
Comments
0 comments