CloudLinux - Igor Seletskiy - CloudLinux Blog - Page 2
Blog

CloudLinux is on a mission to make Linux secure, stable, and profitable, and Igor Seletskiy is at the helm of this undertaking. He is the CEO and founder of the company, and an innovator responsible for the strategic direction of the company and all products within the CloudLinux brand.

Igor is an accomplished technology guru focusing on Linux, kernel development, and the hosting industry. He is a frequent speaker at industry events, and has a successful track record of more than 15 years of delivering innovative products to market.

Meet Imunify360 with Proactive Defense, the sophisticated protection against any kind of malware, all in one nice package.

Meet Imunify360 with Proactive Defense, the sophisticated protection against any kind of malware, all in one nice package.

Meet Imunify360 with Proactive Defense, the sophisticated protection against any kind of malware, all in one nice package.
Proactive Defense, the new feature of Imunify360, has now been released to production for cPanel customers. This new technology has made a significant contribution in our multi-layer security in stopping malware and protecting your Linux Web servers from most, if not all, attacks.Security must be effective, and Imunify360 with Proactive Defense is....
Continue reading
  3856 Hits
  0 Comments
How to stop playing Whack-A-Mole with malware and actually protect servers from attacks

How to stop playing Whack-A-Mole with malware and actually protect servers from attacks

How to stop playing Whack-A-Mole with malware and actually protect servers from attacks
Software vulnerabilities are constantly being exploited and monetized, and organized crime now consist of large development teams with substantial budgets. It has become a profitable industry that has seen rapid growth, fueled by ransomware schemes and cryptomining exploits, all without dire consequences. Malware is used by attackers to steal data,...
Continue reading
Recent Comments
Guest — Andrei g.
That moment when you write in a ticket that imunify is useless without a proactive option, and now this happens. Gj guys.... Read More
Friday, 06 July 2018 11:12
Guest — Kirill Bokov - Project Manager at Imunify360
We are always improving and will continue to improve. Yet, if you have any reservations about IM360, please, write to us. Thanks.... Read More
Tuesday, 10 July 2018 15:39
  4720 Hits
  2 Comments
CloudLinux and GDPR
Tags:

CloudLinux and GDPR

CloudLinux and GDPR
The General Data Protection Regulation (GDPR) (EU) 2016/679 is a regulation in the EU law on data protection and privacy for all individuals within the European Union. It also addresses the export of personal data outside the EU. The GDPR aims primarily to give control to citizens and residents over their personal data and to simplify the regulator...
Continue reading
  7200 Hits
  0 Comments
Imunify360 Protects Customers Against Highly Critical Drupal Exploit

Imunify360 Protects Customers Against Highly Critical Drupal Exploit

Imunify360 Protects Customers Against Highly Critical Drupal Exploit
Drupal has recently patched a critical remote code execution exploit SA-CORE-2018-002/CVE-2018-7600. This vulnerability may result in Drupal sites to be completely compromised.Imunify360 protects against this vulnerability using built-in Web Application Firewall (WAF) as well as the intelligent botnet protection. Our team has pushed out updates whe...
Continue reading
  4596 Hits
  0 Comments
KernelCare fixes Meltdown and Spectre without reboots!

KernelCare fixes Meltdown and Spectre without reboots!

KernelCare fixes Meltdown and Spectre without reboots!
KernelCare now live patches Meltdown and Spectre (spectre-v1) that exploit critical vulnerabilities in modern processors. The list of supported distributions is available below. Free trial supports updates too.By now, you might have thought that the topic of Meltdown and Spectre vulnerabilities is taking a backstage in the news. Not so, as the impa...
Continue reading
Recent Comments
Guest — Eric Caldwell
What blog page do we need to tune into for the CL6 KC patches?
Tuesday, 06 February 2018 18:52
Alexandre Parubochyi
Please follow https://cloudlinux.com/cloudlinux-os-blog/entry/intel-cpu-bug-kernelcare-and-cloudlinux... Read More
Tuesday, 06 February 2018 19:30
Guest — Stéphan Schamp
Keep getting: # kcarectl -u Updates already downloaded Unable to apply patch (/var/cache/kcare/4796c6a424d5f4abf9482d4e335a60d79... Read More
Wednesday, 07 February 2018 09:54
  11630 Hits
  19 Comments
Intel CPU Bug - Meltdown and Spectre - KernelCare and CloudLinux

Intel CPU Bug - Meltdown and Spectre - KernelCare and CloudLinux

Intel CPU Bug - Meltdown and Spectre - KernelCare and CloudLinux
Update [May 29, 2018 12:25am PT]Meltdown fixes for Ubuntu 16.04 are now on test.To deploy them:edit /etc/sysconfig/kcare/kcare.confAdd:PREFIX=testRun:kcarectl --updateTAGNAME: update-2018-05-29-test-1ubuntu-xenial:  CVE-2017-5754: Systems with microprocessors utilizing speculative execution and    indirect branch prediction may allow...
Continue reading
Recent Comments
Guest — Richard Hordern
A bit more info has been recently published here: https://newsroom.intel.com/news/intel-responds-to-security-research-findings/ I... Read More
Wednesday, 03 January 2018 21:02
Guest — Miguel
When do you expect to have a solution?still waiting
Thursday, 04 January 2018 19:10
Guest — somebody
I just want to say thanks for your outstanding work. I hope there will be soon patches for kernelcare, specially for OpenVZ and Ce... Read More
Thursday, 04 January 2018 22:26
  105180 Hits
  148 Comments
The Symlink Protection patchset is available for free for CentOS 6 & 7, even if you are not running KernelCare
Tags:

The Symlink Protection patchset is available for free for CentOS 6 & 7, even if you are not running KernelCare

The Symlink Protection patchset is available for free for CentOS 6 & 7, even if you are not running KernelCare
A few weeks ago we released the KernelCare "Extra" Patchset with the security fixes and the symlink protection available to all KernelCare customers running CentOS kernels. Today we are pleased to share that you can get the Symlink Protection Patchset for CentOS 6 and 7 at no cost, even if you don’t have licenses of KernelCare.We’ve been discussing...
Continue reading
Recent Comments
Guest — Youssef B.
Thank you, But it doesn't work for me. .. Running Transaction Installing : kernelcare-2.13-1.x86_64 ... Read More
Wednesday, 04 October 2017 23:44
Igor Seletskiy
sorry, it should have been: kcarectl --set-patch-type free
Thursday, 05 October 2017 00:49
Guest — Micheal
Thank you for this support. Are patches disabled in kernel updates we made manually?
Thursday, 05 October 2017 21:32
  38958 Hits
  114 Comments
Backup Survey: What Backup Solution Do You Use?

Backup Survey: What Backup Solution Do You Use?

Backup Survey: What Backup Solution Do You Use?
Today I’d like to ask for your help in this short but an important survey. We’d like to know more about your server backup solutions and preferences - it will help us better understand the needs of the hosting market and our product direction.It will take less than a minute to complete as it contains only a few questions. This survey will not ask f...
Continue reading
  3611 Hits
  0 Comments
The KernelCare "Extra" Patchset for CentOS 6 & 7 with symlink protection is here

The KernelCare "Extra" Patchset for CentOS 6 & 7 with symlink protection is here

The KernelCare "Extra" Patchset for CentOS 6 & 7 with symlink protection is here
The KernelCare extra patchset includes all the security fixes from KernelCare for CentOS 6 and CentOS 7, as well as the symlink protection against a symlink race.A symlink race attack is often used against shared hosting servers. It allows a malicious user to serve files that belong to other users by creating a symbolic link to those files. It is o...
Continue reading
Recent Comments
Guest — john
not working for me, plus you type some of it wrong kcarectl --set-patch-type extra --update usage: kcarectl [-h] [-i] [-u] [--un... Read More
Tuesday, 22 August 2017 19:19
Igor Seletskiy
Make sure you have the latest version of kernelcare. Do yum update kernelcare --> it should help.
Wednesday, 23 August 2017 02:07
Guest — adm
kcarectl --set-patch-type extra --update 'extra' patch type selected Downloading updates HTTP Error 404: Not Found, Retrying in 3 ... Read More
Tuesday, 22 August 2017 20:07
  18902 Hits
  17 Comments
New privilege escalation vulnerability found in Linux kernel

New privilege escalation vulnerability found in Linux kernel

New privilege escalation vulnerability found in Linux kernel
A race condition in Linux kernel was disclosed today, August 3rd, 2017 (see CVE-2017-7533). It can be exploited to allows an unprivileged local user to gain root access to the server. Currently, there is an existing working exploit allowing privileges escalation for 32 bit kernels. It is unclear whether such exploit exists for 64 bit kernels, but s...
Continue reading
  6944 Hits
  0 Comments