#ssh

[ follow ]
#ansible
fromZDNET
3 months ago

My favorite SSH clients for Android - and why you need them

You can connect to Linux machines via SSH using Android apps like JuiceSSH and Termius.
Information security
fromSecuritymagazine
3 months ago

Devices exposed to remote hacking via Erlang/OTP SSH vulnerability

Erlang/OTP's SSH implementation has a critical vulnerability allowing remote code execution without authentication, requiring urgent attention and action from security teams.
fromZDNET
3 months ago

5 things to do with the Linux terminal on your Android phone - including my favorite

If you have a phone running Android 15, you can enable a full-blown Linux terminal that includes many of the commands you're used to running on Linux.
Gadgets
Cryptocurrency
fromThe Hacker News
4 months ago

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

The Outlaw botnet targets SSH servers with weak credentials for cryptocurrency mining via brute-force attacks.
Information security
fromTechzine Global
5 months ago

OpenSSH vulnerability enables MitM attacks

OpenSSH has two significant vulnerabilities that can lead to man-in-the-middle attacks and denial of service.
Users should disable VerifyHostKeyDNS if enabled and upgrade OpenSSH as soon as patches are available.
fromInfoQ
8 months ago

Cloudflare Introduces Short-Lived SSH Access, Eliminating the Need for SSH Credentials

Cloudflare's Access for Infrastructure SSH enhances security by replacing traditional SSH keys with short-lived, ephemeral certificates.
[ Load more ]