Security News
WikiLeaks has published documents detailing BothanSpy and Gyrfalcon, tools allegedly used by the U.S. Central Intelligence Agency (CIA) to steal SSH credentials from Windows and Linux systems. read more
WikiLeaks has today published the 15th batch of its ongoing Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell)...
Rapid7 warned this week that its Nexpose appliances were shipped with a SSH configuration that could have let obsolete algorithms be used for key exchange.
Developers at Uber have unveiled a new module to help users enable the continuous re-authentication of SSH keys.
SSH-audit is a standalone open source tool for auditing and fixing SSH server configurations. It has no dependencies and will run wherever Python is available. It supports OpenSSH, Dropbear SSH...
Akamai warns that attackers are compromising IOT devices and using them as proxies to test stolen credentials against web-based applications.
ExaGrid has removed public-private pairings and weak, hardcoded default credentials from its disk-backup appliances.