RSS
Igor Seletskiy

Igor Seletskiy

CloudLinux is on a mission to make Linux secure, stable, and profitable, and Igor Seletskiy is at the helm of this undertaking. He is the CEO and founder of the company, and an innovator responsible for the strategic direction of the company and all products within the CloudLinux brand.

Igor is an accomplished technology guru focusing on Linux, kernel development, and the hosting industry. He is a frequent speaker at industry events, and has a successful track record of more than 15 years of delivering innovative products to market.

Igor Seletskiy's articles

by / Wednesday, 04 October 2017
The Symlink Protection patchset is available for free for CentOS 6 & 7, even if you are not running KernelCare

A few weeks ago we released the KernelCare "Extra" Patchset with the security fixes and the symlink protection available to all KernelCare customers running CentOS kernels. Today we are pleased to share that you can get the Symlink Protection Patchset for CentOS 6 and 7 at no cost, even if you...

Continue reading

Topic: in KernelCare Blog


by / Monday, 25 September 2017
Backup Survey: What Backup Solution Do You Use?

Today I’d like to ask for your help in this short but an important survey. We’d like to know more about your server backup solutions and preferences - it will help us better understand the needs of the hosting market and our product direction.

It will take less than a minute to complete as...

Continue reading

Topic: in CloudLinux OS Blog Imunify360 Blog


by / Tuesday, 22 August 2017
The KernelCare "Extra" Patchset for CentOS 6 & 7 with symlink protection is here

The KernelCare extra patchset includes all the security fixes from KernelCare for CentOS 6 and CentOS 7, as well as the symlink protection against a symlink race.

A symlink race attack is often used against shared hosting servers. It allows a malicious user to serve files that belong to other...

Continue reading

Topic: in KernelCare Blog Imunify360 Blog


by / Thursday, 03 August 2017
New privilege escalation vulnerability found in Linux kernel

A race condition in Linux kernel was disclosed today, August 3rd, 2017 (see CVE-2017-7533). It can be exploited to allows an unprivileged local user to gain root access to the server. Currently, there is an existing working exploit allowing privileges escalation for 32 bit kernels. It is unclear...

Continue reading

Topic: in KernelCare Blog


by / Wednesday, 12 July 2017
LibCare, a toolset for livepatching of user space software, is now available as Open Source on GitHub

I am super thrilled to let you know that we have published a toolset for livepathing of user space software, called LibCare, to GitHub. It is released under the GPL2 license and allows software developers to develop and apply patches to their running software without the need to restart...

Continue reading

Topic: in KernelCare Blog


by / Tuesday, 11 July 2017
Imunify360 now protects against zero-day attacks, powered by the Wallarm machine learning engine

I am pleased to share that Wallarm’s technology now helps defend our Imunify360 customers’ web applications against zero-day attacks. It analyzes huge troves of Web traffic looking for anomalies and detects ongoing zero-day attacks before they even become known to the public. It then...

Continue reading

Topic: in Imunify360 Blog


by / Thursday, 06 July 2017
Imunify360’s latest malware scanning engine outperforms other technologies

Yesterday, we released the latest version of Imunify360. In addition to a few important features, such as Plesk support, it now includes new and greatly improved malware scanning engine. Our latest release shows significantly better malware scanning results than most popular free or paid...

Continue reading

Topic: in Imunify360 Blog


by / Tuesday, 20 June 2017
Major vulnerability: The Stack Clash security issue found that affects most Linux kernels

[Last updated Jun 22, 12:05PM PDT]

A new major local privilege escalation vulnerability in the Linux kernel was disclosed yesterday, June 19th, 2017 (CVE-2017-1000364). The vulnerability can be exploited to allows an unprivileged local user to gain root access to the server.

The Qualys' security...

Continue reading

Topic: in KernelCare Blog


by / Thursday, 30 March 2017
Issues caused by the latest KernelCare update and what we will do to ensure it never happens again

UPDATE: Mar 30 - 10am pacific timezone. 24h feed was updated with the same issue due to technician incorrectly removing "at" job. This has been fixed shortly, but some systems have been affected.

We want to apologize for the KernelCare incident that affected some of our customers yesterday....

Continue reading

Topic: in KernelCare Blog


by / Wednesday, 29 March 2017
Issues caused by the latest KernelCare update

We’ve received reports that our latest patchset affected some CentOS/CloudLinux/OpenVZ 6 kernels. We’ve immediately rolled back the patch, have evaluated the issue and identified the cause to prevent issues in the future releases. Please accept our apologies and standby for additional...

Continue reading

Topic: in KernelCare Blog


1 2 3 4 5 6 7 8 9 10