Security News > 2016 > October > Old SSH Vulnerability at Center of Credential-Stuffing Attacks (Threatpost)

2016-10-13 15:27
Akamai warns that attackers are compromising IOT devices and using them as proxies to test stolen credentials against web-based applications.
News URL
http://threatpost.com/old-ssh-vulnerability-at-center-of-credential-stuffing-attacks/121266/
Related news
- New OpenSSH flaws expose SSH servers to MiTM and DoS attacks (source)
- CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks (source)
- Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks (source)
- How New AI Agents Will Transform Credential Stuffing Attacks (source)
- Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials (source)
- Critical PHP RCE vulnerability mass exploited in new attacks (source)
- Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks (source)
- Australian pension funds hit by wave of credential stuffing attacks (source)
- CISA Warns of CentreStack's Hard-Coded MachineKey Vulnerability Enabling RCE Attacks (source)