Security News

Xton Access Manager now includes RDP, SSH and HTTP proxy support
2020-02-05 03:00

Xton Technologies, a provider of privileged access management solutions, announced that Xton Access Manager now includes advanced proxy support for RDP, SSH and web proxies allowing customers to create secure, high trust remote sessions with full session recording and keystroke monitoring using native desktop or mobile applications. "Unique to XTAM is our ability to securely lock credentials on the server-side without ever releasing them to the client computer even in an encrypted form. This provides administrators with secure and efficient access to the systems they need to do their jobs while satisfying audit and senior management requirements for just in time secure access and controls."

Snowflake is the Linux SSH GUI you didn't know you needed
2020-01-29 20:02

Is a Linux SSH GUI in your future? Jack Wallen believes once you try Snowflake, there's no going back. 90% of the time I'm using that tool from the Linux platform, where I open a terminal window and SSH into what seems like an endless array of remote servers.

Snowflake is the Linux SSH GUI you didn't know you needed
2020-01-29 20:01

Is a Linux SSH GUI in your future? Jack Wallen believes once you try Snowflake, there's no going back.

Hardcoded SSH Key Found in Fortinet SIEM Appliances
2020-01-20 19:37

A hardcoded SSH public key in Fortinet's Security Information and Event Management FortiSIEM can be abused to access the FortiSIEM Supervisor. The hardcoded SSH key is for the user 'tunneluser', is the same between installs and is also stored unencrypted in the FortiSIEM image.

SSH and Digital Information Technologies help enterprises mitigate risks of privileged credential abuse
2020-01-10 00:30

SSH Communications Security, one of the world's most trusted security brands, has formed a partnership with Digital Information Technologies, an independent systems integration company operating in Japan since 1982. Adoption of multi-cloud and hybrid services creates a lot of complexity for companies and their IT admins who need to constantly onboard and offboard privileged users, such as developers and IT consultants.

How to enable SSH login on macOS
2019-12-20 17:09

If you have a reason to log in to your macOS machine, from a remote machine on your network, why not enable the SSH daemon.

How to use per-host SSH configuration
2019-11-25 23:17

Learn how to make your SSH use more efficient and convenient with per-host configurations.

TrickBot Evolves to Go After SSH Keys
2019-11-25 22:36

The info-stealing malware has updated its password-grabbing module.

How to use per-host SSH configuration
2019-11-14 21:43

Learn how to make your SSH use more efficient and convenient with per-host configurations.

How to copy a file from one server to another from a third with SSH
2019-11-01 17:17

Find out how to work some SSH magic, by transferring a file from one machine to another from a third.