Security News

How to Mount Remote Directories with SSH (+Video Tutorial)
2023-10-11 10:05

How to Mount Remote Directories with SSH Learn how to easily mount remote directories with the help of a more secure SSH tool. Do you have remote directories you need to mount on your local desktop so you can work on code, configurations, documentation or just about any kind of file? If those remote files are on a server and you don't want to share them via the less secure Samba, Secure Shell has you covered.

SSH keys stolen by stream of malicious PyPI and npm packages
2023-09-27 21:48

A stream of malicious npm and PyPi packages have been found stealing a wide range of sensitive data from software developers on the platforms. The campaign started on September 12, 2023, and was first discovered by Sonatype, whose analysts unearthed 14 malicious packages on npm.

How to Compare the Contents of Local & Remote Files With the Help of SSH
2023-09-25 19:05

Have you ever needed to compare the contents of a local and remote file without having to copy the remote file to the local machine and then run the diff command on both? Sure, it's not exactly a challenging task, but it's not exactly the most efficient way to compare those files. Let's say you have a file named test on both local and remote machines, and you want to compare the contents.

How to Create and Copy SSH Keys with 2 Simple Commands (+Video Tutorial)
2023-09-25 12:34

How to Create and Copy SSH Keys with 2 Simple Commands SSH keys provide a secure and convenient way to authenticate remote servers. In this step-by-step tutorial, Jack Wallen explains how to easily create and copy SSH keys.

Fresh Wave of Malicious npm Packages Threaten Kubernetes Configs and SSH Keys
2023-09-20 10:13

Cybersecurity researchers have discovered a fresh batch of malicious packages in the npm package registry that are designed to exfiltrate Kubernetes configurations and SSH keys from compromised...

PoC Exploit Released for Critical VMware Aria's SSH Auth Bypass Vulnerability
2023-09-03 04:42

Proof-of-concept exploit code has been made available for a recently disclosed and patched critical flaw impacting VMware Aria Operations for Networks. "A malicious actor with network access to Aria Operations for Networks could bypass SSH authentication to gain access to the Aria Operations for Networks CLI," VMware said earlier this week.

Exploit released for critical VMware SSH auth bypass vulnerability
2023-09-01 20:21

Proof-of-concept exploit code has been released for a critical SSH authentication bypass vulnerability in VMware's Aria Operations for Networks analysis tool.Today, VMware confirmed that CVE-2023-34039 exploit code has been published online, two days after disclosing the critical security bug.

VMware Aria vulnerable to critical SSH authentication bypass flaw
2023-08-30 16:19

VMware Aria Operations for Networks is vulnerable to a critical severity authentication bypass flaw that could allow remote attackers to bypass SSH authentication and access private endpoints. VMware Aria is a suite for managing and monitoring virtualized environments and hybrid clouds, enabling IT automation, log management, analytics generation, network visibility, security and capacity planning, and full-scope operations management.

How to Use an SSH Config File on macOS for Easier Connections to Your Data Center Servers
2023-07-10 09:30

How to Use an SSH Config File on macOS for Easier Connections to Your Data Center Servers Jack Wallen shows you how to make SSH connections even easier from your macOS machine. The only thing you'll need is a MacBook or iMac that includes SSH and some remote servers to connect to.

New proxyjacking attacks monetize hacked SSH servers’ bandwidth
2023-06-30 18:47

Attackers behind an ongoing series of proxyjacking attacks are hacking into vulnerable SSH servers exposed online to monetize them through proxyware services that pay for sharing unused Internet bandwidth. Like cryptojacking, which allows attackers to use hacked systems to mine for cryptocurrency, proxyjacking is a low-effort and high-reward tactic of leeching compromised devices' resources.