SSH

Terrapin attack allows to downgrade SSH protocol securityTerrapin attack allows to downgrade SSH protocol security

Terrapin attack allows to downgrade SSH protocol security

Researchers discovered an SSH vulnerability, called Terrapin, that could allow an attacker to downgrade the connection's security. Security researchers from…

1 year ago
Experts analyzed attacks against poorly managed Linux SSH serversExperts analyzed attacks against poorly managed Linux SSH servers

Experts analyzed attacks against poorly managed Linux SSH servers

Researchers warn of attacks against poorly managed Linux SSH servers that mainly aim at installing DDoS bot and CoinMiner. Researchers…

1 year ago
Linux/Rakos, the new Linux malware threatening devices and serversLinux/Rakos, the new Linux malware threatening devices and servers

Linux/Rakos, the new Linux malware threatening devices and servers

A new Linux malware, dubbed Linux/Rakos is threatening devices and servers. The malware searches for victims via SSH scan. A…

8 years ago
OpenSSH 7.0 Fixes Four Flaws and other issuesOpenSSH 7.0 Fixes Four Flaws and other issues

OpenSSH 7.0 Fixes Four Flaws and other issues

A new version of OpenSSH is available, the new release of OpenSSH 7.0 fixes four security flaws and several other…

10 years ago
Cisco Security Appliances contain a default SSH KeyCisco Security Appliances contain a default SSH Key

Cisco Security Appliances contain a default SSH Key

Security experts at Cisco revealed the existence of a default SSH key in many security appliances, an attacker can exploit…

10 years ago
Compromised SSH keys used to access popular GitHub repositoriesCompromised SSH keys used to access popular GitHub repositories

Compromised SSH keys used to access popular GitHub repositories

Security experts Ben Cox explained that the official Github repositories of the UK Government, Spotify, and Python were accessed using…

10 years ago
Shodan Founder finds 250,000 routers sharing same SSH keysShodan Founder finds 250,000 routers sharing same SSH keys

Shodan Founder finds 250,000 routers sharing same SSH keys

The Founder of Shodan John Matherly was revamping the SSH banner when discovered a large number of devices that share…

10 years ago
Linux backdoor Fokirtor implements covert communication protocolLinux backdoor Fokirtor implements covert communication protocol

Linux backdoor Fokirtor implements covert communication protocol

In May sophisticated attackers breached a large Internet hosting provider and gained access to internal administrative systems using a singular…

12 years ago