Security News

GoScanSSH Malware Targets SSH Servers, But Avoids Military and .GOV Systems
2018-03-27 19:07

Researchers identify a new malware family called GoScanSSH that avoids servers linked to government and military IP addresses.

Crypto-Miner Botnet Spreads over SSH
2018-01-04 14:29

A recently discovered Linux crypto-miner botnet spreading over the SSH protocol is based on the Python scripting language, which makes it difficult to detect, F5 Networks has discovered. read more

Half of organizations do not audit SSH entitlements
2017-11-17 12:00

Cybercriminals, such as malicious insiders, use SSH keys to access systems from remote locations, evade security tools and escalate privileges, according to a study conducted by Dimensional...

SSH-based Hijacker Targeting Ethereum Miners
2017-11-02 18:29

Crypto-currency miners represent an easy solution when it comes to taking advantage of a system’s computing power to earn some money, but can result in no gain if the mined coins are going to...

Hackers Take Aim at SSH Keys in New Attacks
2017-10-19 18:26

SSH private keys are being targeted by hackers who have stepped up the scanning of thousands of WordPress website in search of private keys.

Most organizations don’t have SSH security policies in place
2017-10-19 13:45

Cybercriminals can abuse SSH keys to secure and automate administrator-to-machine and machine-to-machine access to critical business functions. According to Venafi’s research, even though SSH keys...

Nmap 7.60 released: SSH support, SMB2/SMB3 improvements, 14 more scripts (Help Net Security)
2017-08-02 12:40

Nmap is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing...

CIA Tools for Stealing SSH Credentials Exposed by WikiLeaks (Security Week)
2017-07-07 09:17

WikiLeaks has published documents detailing BothanSpy and Gyrfalcon, tools allegedly used by the U.S. Central Intelligence Agency (CIA) to steal SSH credentials from Windows and Linux systems. read more

Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows & Linux PCs (The Hackers News)
2017-07-06 11:41

WikiLeaks has today published the 15th batch of its ongoing Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell)...

SSH Configuration on Nexpose Servers Allowed Weak Encryption Algorithms (Threatpost)
2017-06-02 16:46

Rapid7 warned this week that its Nexpose appliances were shipped with a SSH configuration that could have let obsolete algorithms be used for key exchange.