×

Message

Failed loading XML... Document is empty

Displaying items by tag: SSH

The repository of the open-source compression utility xz Utils, in which a backdoor was found prior to the Easter weekend, has now been restored to GitHub.

Published in Security

GUEST RESEARCH: Cado Security, provider of the first cloud forensics and incident response platform, today announced the release of Cado Security Labs 2023 Cloud Threat Findings Report. The report reveals noteworthy discoveries about the evolving cloud threat landscape, shedding light on the heightened risk of cyberattacks due to the rapid adoption of cloud-focused services.

Published in Guest Research

GUEST OPINION: As with all technology, new tools are iterations built on what came before, and classic network logging and metrics are no different.

Published in Guest Opinion
Friday, 21 October 2022 10:30

Poor passwords still a problem: research

Attackers largely rely on exposed passwords when attacking systems, a new report suggests.

Published in Security

A significant percentage of organisations expose insecure or highly sensitive protocols, including SMB, SSH, and Telnet, to the public internet, according to the latest Cyber Risk and Readiness report from network detection and response specialist ExtraHop.

Published in Security

GUEST OPINION: As cybercriminals hunt for new and more sophisticated ways to mount attacks, many are paying close attention to the role played by machine identities.

Published in Guest Opinion

Cloud security specialist Zscaler has added three new capabilities to the Zscaler Zero Trust Exchange: private app protection, integrated deception, and privileged remote access from IIoT and OT systems.

Published in Security

GitHub is holding its annual GitHub Universe conference this week with new features announced adding even more power to the site’s GitHub Actions, GitHub Copilot, and GitHub Codespaces, and introducing GitHub Issues.

Published in Open Source

A vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware is one route through which Linux malware, observed by researchers at Trend Micro to be attacking Huawei Cloud, a relatively new cloud service provider, gain access to systems.

Published in Security

Attackers used a script written in Python during a recent ransomware attack which took just three hours, encrypting all the virtual disks on the target's virtual machine hypervisor.

Published in Security

 

Attacks on SolarWinds software in July were possible because the company had compiled some dynamic link libraries without Address Space Layout Randomisation, Microsoft claims in a security brief.

Published in Security

Them pesky Russians are up to no good again, trying to hack their way in to steal research about COVID-19 vaccines. The attack appears to have been carried out by a fat man who couldn't be bothered to even hide his IP address, so sophisticated was his approach.

Published in Open Sauce

Ransomware that uses SSH brute-force attacks to gain access to Linux-based network-attached storage systems has been spotted by the security firm Intezer.

Published in Security

Researchers at security outfit F5 Labs say they have found Golang-based malware that attacks Linux servers through a variety of methods.

Published in Security

A tech website which profits from the sale of anti-spyware programs has taken a hit again, with ransomware masquerading as a product for which it is an affiliate.

Published in Security
Tuesday, 11 September 2018 12:50

Humans need help with key management: strategist

"People don't understand machine identities very well," Venafi chief cyber security strategist Kevin Bocek told iTWire.

Published in Security
Wednesday, 28 February 2018 10:46

Uh, oh! Linux confuses Bleeping Computer again

The tech website Bleeping Computer, which carries news about security and malware, has once again demonstrated that when it comes to Linux, its understanding of security is somewhat lacking.

Published in Open Sauce

WikiLeaks has released CIA documents detailing implants that can be used to steal traffic from SSH sessions on both Windows and Linux systems, in the latest dump from its Vault 7 stash.

Published in Security
Wednesday, 08 July 2015 10:13

NSA runs its spying activities on Red Hat Linux

A little over two years ago, the first disclosures about the massive surveillance operation being carried out by the NSA were made in the Guardian, thanks to an intrepid contractor named Edward Snowden.

Published in Open Sauce
Tuesday, 04 October 2011 11:11

Linux kernel project site back on the air

Servers at the Linux kernel project site are back on the air, nearly two months after they were compromised.

Published in Open Sauce
Tagged under
Page 1 of 2

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments