Displaying items by tag: SSH

A vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware is one route through which Linux malware, observed by researchers at Trend Micro to be attacking Huawei Cloud, a relatively new cloud service provider, gain access to systems.

Published in Security

Attackers used a script written in Python during a recent ransomware attack which took just three hours, encrypting all the virtual disks on the target's virtual machine hypervisor.

Published in Security

 

Attacks on SolarWinds software in July were possible because the company had compiled some dynamic link libraries without Address Space Layout Randomisation, Microsoft claims in a security brief.

Published in Security

Them pesky Russians are up to no good again, trying to hack their way in to steal research about COVID-19 vaccines. The attack appears to have been carried out by a fat man who couldn't be bothered to even hide his IP address, so sophisticated was his approach.

Published in Open Sauce

Ransomware that uses SSH brute-force attacks to gain access to Linux-based network-attached storage systems has been spotted by the security firm Intezer.

Published in Security

Researchers at security outfit F5 Labs say they have found Golang-based malware that attacks Linux servers through a variety of methods.

Published in Security

A tech website which profits from the sale of anti-spyware programs has taken a hit again, with ransomware masquerading as a product for which it is an affiliate.

Published in Security
Tuesday, 11 September 2018 12:50

Humans need help with key management: strategist

"People don't understand machine identities very well," Venafi chief cyber security strategist Kevin Bocek told iTWire.

Published in Security
Wednesday, 28 February 2018 10:46

Uh, oh! Linux confuses Bleeping Computer again

The tech website Bleeping Computer, which carries news about security and malware, has once again demonstrated that when it comes to Linux, its understanding of security is somewhat lacking.

Published in Open Sauce

WikiLeaks has released CIA documents detailing implants that can be used to steal traffic from SSH sessions on both Windows and Linux systems, in the latest dump from its Vault 7 stash.

Published in Security
Wednesday, 08 July 2015 10:13

NSA runs its spying activities on Red Hat Linux

A little over two years ago, the first disclosures about the massive surveillance operation being carried out by the NSA were made in the Guardian, thanks to an intrepid contractor named Edward Snowden.

Published in Open Sauce
Tuesday, 04 October 2011 11:11

Linux kernel project site back on the air

Servers at the Linux kernel project site are back on the air, nearly two months after they were compromised.

Published in Open Sauce
Tagged under
Thursday, 01 September 2011 10:27

Linux kernel project servers compromised

A number of servers at the Linux kernel project have been breached, according to an advisory at the kernel.org website.

Published in Open Sauce
Tagged under

Every geek and technology lover will undoubtedly have stumbled across online adverts for tiny headless Linux-powered devices that are barely larger than the power point they plug into. What can you actually do with them? Plenty, it seems!

Published in The Linux Distillery

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments