fromZDNET3 months agoMy favorite SSH clients for Android - and why you need themYou can connect to Linux machines via SSH using Android apps like JuiceSSH and Termius.
Information securityfromSecuritymagazine3 months agoDevices exposed to remote hacking via Erlang/OTP SSH vulnerabilityErlang/OTP's SSH implementation has a critical vulnerability allowing remote code execution without authentication, requiring urgent attention and action from security teams.
fromZDNET3 months ago5 things to do with the Linux terminal on your Android phone - including my favoriteIf you have a phone running Android 15, you can enable a full-blown Linux terminal that includes many of the commands you're used to running on Linux.Gadgets
CryptocurrencyfromThe Hacker News4 months agoOutlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux ServersThe Outlaw botnet targets SSH servers with weak credentials for cryptocurrency mining via brute-force attacks.
Information securityfromTechzine Global5 months agoOpenSSH vulnerability enables MitM attacksOpenSSH has two significant vulnerabilities that can lead to man-in-the-middle attacks and denial of service.Users should disable VerifyHostKeyDNS if enabled and upgrade OpenSSH as soon as patches are available.
fromInfoQ8 months agoCloudflare Introduces Short-Lived SSH Access, Eliminating the Need for SSH CredentialsCloudflare's Access for Infrastructure SSH enhances security by replacing traditional SSH keys with short-lived, ephemeral certificates.