Security News

Critical default credential in Kubernetes Image Builder allows SSH root access
2024-10-16 21:58

It's called leaving the door wide open – especially in Proxmox A critical bug in Kubernetes Image Builder could allow unauthorized SSH access to virtual machines (VMs) thanks to default...

Critical Kubernetes Image Builder flaw gives SSH root access to VMs
2024-10-16 16:58

A critical vulnerability in Kubernetes could allow unauthorized SSH access to a virtual machine running an image created with the Kubernetes Image Builder project. [...]

New Gafgyt Botnet Variant Targets Weak SSH Passwords for GPU Crypto Mining
2024-08-15 05:12

Cybersecurity researchers have discovered a new variant of the Gafgyt botnet that's targeting machines with weak SSH passwords to ultimately mine cryptocurrency on compromised instances using their GPU computational power. The infected devices are corralled into a botnet capable of launching distributed denial-of-service attacks against targets of interest.

SSHamble: Open-source security testing of SSH services
2024-08-08 06:24

This tool helps security teams validate SSH implementations by testing for uncommon but dangerous misconfigurations and software bugs. Activities intended to aid in responding to the incident led runZero's research team to discover weaknesses across SSH implementations and applications that impact critical network security devices and software.

Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
2024-07-31 04:00

Secretive is an open-source, user-friendly app designed to store and manage SSH keys within the Secure Enclave. Typically, SSH keys are stored on disk with appropriate permissions, which is usually sufficient.

CRYSTALRAY hacker expands to 1,500 breached systems using SSH-Snake tool
2024-07-11 15:09

SSH-snake is an open-source worm that steals SSH private keys on compromised servers and uses them to move laterally to other servers while dropping additional payloads on breached systems. Previously, Sysdig identified roughly 100 CRYSTALRAY victims impacted by the SSH-Snake attacks and highlighted the network mapping tool's capabilities to steal private keys and facilitate stealthy lateral network movement.

New Open SSH Vulnerability
2024-07-03 15:27

The vulnerability, which is a signal handler race condition in OpenSSH's server, allows unauthenticated remote code execution as root on glibc-based Linux systems; that presents a significant security risk. This vulnerability, if exploited, could lead to full system compromise where an attacker can execute arbitrary code with the highest privileges, resulting in a complete system takeover, installation of malware, data manipulation, and the creation of backdoors for persistent access.

Citrix warns admins to manually mitigate PuTTY SSH client bug
2024-05-09 19:27

Citrix notified customers this week to manually mitigate a PuTTY SSH client vulnerability that could allow attackers to steal a XenCenter admin's private SSH key. The security flaw impacts multiple versions of XenCenter for Citrix Hypervisor 8.2 CU1 LTSR, which bundle and use PuTTY to make SSH connections from XenCenter to guest VMs when clicking the "Open SSH Console" button.

Cisco Warns of Global Surge in Brute-Force Attacks Targeting VPN and SSH Services
2024-04-17 08:38

Cisco is warning about a global surge in brute-force attacks targeting various devices, including Virtual Private Network (VPN) services, web application authentication interfaces, and SSH...

PuTTY SSH client flaw allows recovery of cryptographic private keys
2024-04-16 15:01

A vulnerability tracked as CVE-2024-31497 in PuTTY 0.68 through 0.80 could potentially allow attackers with access to 60 cryptographic signatures to recover the private key used for their generation. PuTTY is a popular open-source terminal emulator, serial console, and network file transfer application that supports SSH, Telnet, SCP, and SFTP. System administrators and developers predominantly use the software to remotely access and manage servers and other networked devices over SSH from a Windows-based client.