In January, Qualys discovered a new vulnerability for Linux, which has been named PwnKit. To address this, we recently published a blog that described how PAM Server Control can help to prevent hackers from exploiting this vulnerability. To further this discussion, we invite you to join us for the first session in our new PAM Tech Talk series. During this session, Kiran Singupurapu, Product Owner for PAM, will walk through the steps to protect the Unix commands that could be exploited by this vulnerability, with a sample policy that can be used.
In January, Qualys discovered a new vulnerability for Linux, which has been named PwnKit. To address this, we recently published a blog that described how PAM Server Control can help to prevent hackers from exploiting this vulnerability. To further this discussion, we invite you to join us for the first session in our new PAM Tech Talk series. During this session, Kiran Singupurapu, Product Owner for PAM, will walk through the steps to protect the Unix commands that could be exploited by this vulnerability, with a sample policy that can be used.