#ssh-config

[ follow ]
Information security
fromTNW | Next-Featured
2 hours ago

OpenAI launches hardware security keys for ChatGPT with Yubico partnership and disables password login for high-risk users

OpenAI launched Advanced Account Security, replacing passwords with hardware keys and disabling email recovery, targeting sensitive user accounts.
#remote-work
fromAP News
1 week ago
Remote teams

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote teams
fromFast Company
1 week ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
1 week ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
Remote teams
fromNBC Chicago
3 days ago

Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work offers flexibility but comes with privacy and security risks that require precautions.
Remote teams
fromNBC Los Angeles
3 days ago

Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work in public spaces offers flexibility but poses privacy and security risks that require precautions.
Remote teams
fromAP News
1 week ago

One Tech Tip: Logging on at a cafe? Privacy and security guidelines for remote workers

Remote work offers flexibility but comes with privacy and security risks when working in public spaces.
Remote teams
fromFast Company
1 week ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
1 week ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
#open-source
DevOps
fromTechCrunch
2 days ago

Red Hat's OpenClaw maintainer just made enterprise Claw deployments a lot safer | TechCrunch

Tank OS simplifies the deployment and management of OpenClaw agents, enhancing safety and maintenance for power users and IT professionals.
Information security
fromYcombinator
2 weeks ago

Show HN: OpenParallax: OS-level privilege separation for AI agent execution | Hacker News

An open-source AI agent was developed with a secure, sandboxed architecture to prevent data exfiltration and unauthorized actions.
DevOps
fromTechCrunch
2 days ago

Red Hat's OpenClaw maintainer just made enterprise Claw deployments a lot safer | TechCrunch

Tank OS simplifies the deployment and management of OpenClaw agents, enhancing safety and maintenance for power users and IT professionals.
Information security
fromYcombinator
2 weeks ago

Show HN: OpenParallax: OS-level privilege separation for AI agent execution | Hacker News

An open-source AI agent was developed with a secure, sandboxed architecture to prevent data exfiltration and unauthorized actions.
#linux
Information security
fromThe Hacker News
12 hours ago

New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions

A high-severity Linux vulnerability allows unprivileged users to gain root access through a flaw in the kernel's cryptographic subsystem.
DevOps
fromMedium
3 weeks ago

I Asked This Linux Question in Every Interview-And Here's the Catch

Linux knowledge is crucial for DevOps roles, impacting job performance and work-life balance.
Information security
fromThe Hacker News
12 hours ago

New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions

A high-severity Linux vulnerability allows unprivileged users to gain root access through a flaw in the kernel's cryptographic subsystem.
DevOps
fromMedium
3 weeks ago

I Asked This Linux Question in Every Interview-And Here's the Catch

Linux knowledge is crucial for DevOps roles, impacting job performance and work-life balance.
#cybersecurity
Privacy technologies
fromMail Online
6 days ago

How to create secure passwords - it might be time to switch to passkey

Using unique passwords and transitioning to passkeys enhances online security and reduces the risk of cyber threats.
Node JS
fromInfoQ
1 month ago

Are We Ready for the Next Cyber Security Crisis Like Log4shell?

Organizations are not prepared for the next cybersecurity crisis, similar to Log4Shell.
Privacy technologies
fromMail Online
6 days ago

How to create secure passwords - it might be time to switch to passkey

Using unique passwords and transitioning to passkeys enhances online security and reduces the risk of cyber threats.
Node JS
fromInfoQ
1 month ago

Are We Ready for the Next Cyber Security Crisis Like Log4shell?

Organizations are not prepared for the next cybersecurity crisis, similar to Log4Shell.
Node JS
fromInfoWorld
1 week ago

Is your Node.js project really secure?

Dependency security workflows in JavaScript and Node.js lack actionability, leading to late awareness of risks and ineffective responses.
fromSecurityWeek
1 week ago

Half of the 6 Million Internet-Facing FTP Servers Lack Encryption

Approximately 6 million internet-accessible systems are using FTP today, and almost half of them do not use encryption, exposing enterprises and end users to avoidable risks.
Privacy professionals
Information security
fromSecurityWeek
3 days ago

OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years

OpenSSH versions have a vulnerability allowing root access via certificate misconfiguration, undetectable by log-based systems.
Remote teams
fromNBC4 Washington
3 days ago

Logging on at a cafe? Privacy and security guidelines for remote workers

Digital nomads face privacy and security risks while working in public spaces, necessitating precautions and adherence to employer guidelines.
Information security
fromThe Hacker News
1 day ago

Critical cPanel Authentication Vulnerability Identified - Update Your Server Immediately

cPanel released security updates to fix an authentication vulnerability affecting its control panel software.
Information security
fromSecurityWeek
1 day ago

Hundreds of Internet-Facing VNC Servers Expose ICS/OT

Millions of RDP and VNC servers are exposed online, with significant risks to industrial control systems and operational technology.
Privacy technologies
fromEngadget
4 weeks ago

Proton adds a secure video conferencing service called Meet to its toolbox

Proton launches Meet, a privacy-focused video-calling service, competing with Microsoft and Google while ensuring user anonymity and security.
Information security
fromDevOps.com
1 week ago

The Open Source Trap: Why Trust Isn't a Security Strategy - DevOps.com

The software supply chain is vulnerable due to reliance on under-resourced open source maintainers, requiring active organizational support for security.
#vpn
fromZDNET
2 months ago
Privacy technologies

VPN tricks and tips you didn't know you needed (but definitely do)

Privacy professionals
fromWIRED
1 month ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
fromZDNET
2 months ago
Privacy technologies

VPN tricks and tips you didn't know you needed (but definitely do)

#cisco
Information security
fromSecurityWeek
2 weeks ago

Cisco Patches Critical Vulnerabilities in Webex, ISE

Cisco patched 15 vulnerabilities, including critical flaws in Webex and Identity Services Engine, allowing potential unauthorized access and command execution.
Information security
fromThe Hacker News
4 weeks ago

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

Cisco has released critical updates to address vulnerabilities in its Integrated Management Controller and Smart Software Manager On-Prem.
Information security
fromTheregister
2 weeks ago

Critical Fortinet sandbox bugs allow auth bypass and RCE

Two critical vulnerabilities in Fortinet's sandbox allow unauthenticated attackers to bypass authentication or execute unauthorized code.
Digital life
fromWIRED
1 month ago

I Set Up My Own NAS Server, and It Was Surprisingly Easy

Setting up a personal NAS server provides private, automated backups and centralized file storage without relying on third-party cloud services or big tech platforms.
#cups
Information security
fromTheregister
3 weeks ago

AI agents found vulns in this Linux and Unix print server

Two vulnerabilities in CUPS allow unauthenticated remote code execution and root file overwrite, posing significant security risks in networked environments.
Information security
fromTheregister
3 weeks ago

AI agents found vulns in this Linux and Unix print server

Two vulnerabilities in CUPS allow unauthenticated remote code execution and root file overwrite, posing significant security risks in networked environments.
fromZDNET
2 months ago

How to write Linux bash scripts on your Android - and why you'd want to

Bash scripts are a great way to automate all sorts of repetitive tasks -- you can run backups, clear temporary files/logs, rename or batch-rename files, install or update software, and much more. Although writing such scripts isn't nearly as hard as you might think, it does take some time to learn the ins and outs of bash scripting. Also: 6 hidden Android features that are seriously useful (and how they made my life easier) Good news: If you have an Android device, you can enable the Linux terminal, which means you can create or practice your bash scripting on the go.
Software development
fromDevOps.com
3 weeks ago

Is Your AI Agent Secure? The DevOps Case for Adversarial QA Testing - DevOps.com

The most dangerous assumption in quality engineering right now is that you can validate an autonomous testing agent the same way you validated a deterministic application. When your systems can reason, adapt, and make decisions on their own, that linear validation model collapses.
Information security
Information security
fromTNW | Insights
3 weeks ago

KeeperDB brings zero-trust database access to privileged access management

Database credentials are a major attack vector, and KeeperDB integrates access controls into its PAM platform to enhance security.
Software development
fromZDNET
2 months ago

This Linux distro has one of the smartest security features I've seen (and I've tested dozens)

iDeal OS is a user-friendly, Debian-based rolling-release distribution featuring KDE Plasma, two editions (Emerald and Diamond), and a DNS switcher for enhanced security.
Information security
fromThe Hacker News
3 weeks ago

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Threat actors exploit HTTP cookies for PHP web shells on Linux servers, enabling remote code execution with stealthy control mechanisms.
#vpn-security
fromZDNET
1 month ago
Privacy technologies

10+ VPN tricks and tips I recommend to everyone (whether for personal or business use)

fromZDNET
1 month ago
Privacy technologies

10+ VPN tricks and tips I recommend to everyone (whether for personal or business use)

fromZDNET
2 months ago

8 Linux distros I always recommend first to developers - and why

For the longest time, Linux was considered to be geared specifically for developers and computer scientists. Modern distributions are far more general purpose now -- but that doesn't mean there aren't certain distros that are also ideal platforms for developers. What makes a distribution right for developers? Although I consider app compatibility, stability, and flexibility to be essential attributes for most any Linux distribution, developers also need the right tools
Software development
fromZDNET
2 months ago

5 Linux servers that let you ditch the public cloud and reclaim your privacy - for free

You may have noticed that many European Union (EU) governments and agencies, worried about ceding control to untrustworthy US companies, have been embracing digital sovereignty. Those bodies are turning to running their own cloud and services instead of relying on, say, Microsoft 365 or Google Workspace. If you prize your privacy and want to control your own services, you can take that approach as well.
Privacy technologies
Information security
fromTheregister
1 month ago

Security boffins harvest bumper crop of API keys from web

Almost 2,000 API credentials were found exposed on 10,000 webpages, posing significant security risks to organizations and critical infrastructure.
fromZDNET
2 months ago

Your default home Wi-Fi setup isn't nearly as private as it should be - 6 free ways to improve it

We live in a time where privacy is something we actually have to work to enjoy. Achieving a level of privacy we once had takes work, and you need to start thinking beyond a single desktop, laptop, tablet, or phone -- all the way to your LAN. Before I scare you all off, understand that this starts on the desktop and extends to the LAN. By beefing up both your devices and your network, you'll achieve a level of privacy that you wouldn't otherwise have.
Privacy technologies
Information security
fromTNW | Offers
1 month ago

Team password manager costs $1.50 & just added the features businesses actually need

Stolen credentials are a major security risk; using a password manager like Passpack can mitigate this threat effectively.
Privacy technologies
fromEngadget
2 months ago

Why does my VPN keep disconnecting?

VPN disconnections usually stem from provider limits, device settings, internet issues, or kill-switch behavior and can typically be resolved through stepwise troubleshooting.
Information security
fromSecurityWeek
1 month ago

Critical ScreenConnect Vulnerability Exposes Machine Keys

ConnectWise released a security update for ScreenConnect addressing CVE-2026-3564, a critical vulnerability allowing attackers to access cryptographic machine keys by encrypting previously exposed cryptographic material in server configuration files.
Information security
fromMedium
1 month ago

Your AWS Credentials Are Still on GitHub Even After You Delete Them

Prevent credential exposure through .gitignore, environment variables, git-secrets pre-commit hooks, and AWS IAM roles instead of hardcoding credentials in code.
Information security
fromArs Technica
1 month ago

Researchers disclose vulnerabilities in IP KVMs from four manufacturers

IP KVMs pose severe network security risks because compromising them enables attackers to bypass system security and access remotely managed servers.
#sshstalker
Information security
fromSecurityWeek
1 month ago

Critical HPE AOS-CX Vulnerability Allows Admin Password Resets

HPE released patches for a critical vulnerability in Aruba Networking AOS-CX switches that allows remote, unauthenticated attackers to reset administrator passwords and gain full system control.
Information security
fromTechzine Global
2 months ago

BeyondTrust Remote Support has a critical vulnerability

Unauthenticated remote-code-execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access enables full system compromise; affected versions require urgent patching or upgrades.
Information security
fromThe Hacker News
1 month ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
fromTheregister
2 months ago

Sudo's maintainer needs resources to keep utility updated

Sudo, for those not familiar with Unix systems, is a command-line utility that allows authorized users to run specific commands as another user, typically the superuser, under tightly controlled policy rules. It is a foundational component of Unix and Linux systems: without tools like sudo, administrators would be forced to rely more heavily on direct root logins or broader privilege escalation mechanisms, increasing both operational risk and attack surface.
Information security
fromSecurityWeek
1 month ago

Cisco Patches Critical Vulnerabilities in Enterprise Networking Products

This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.
Information security
fromFast Company
2 months ago

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Meanwhile, the actual threat landscape evolved in an entirely different direction. Today's attackers aren't sitting at keyboards manually typing password guesses. They're running offline brute force attacks with dedicated GPU rigs that can attempt 100 billion passwords per second against hashing algorithms like MD5 or SHA-1. At that speed, your clever substitution of "@" for "a" buys you microseconds of additional security.
Information security
Information security
fromZDNET
2 months ago

Kali Linux vs. Parrot OS: Which security-forward distro is right for you?

Kali Linux and Parrot OS are free, Debian-based distributions focused on penetration testing; Parrot OS also offers a general-purpose edition.
fromWIRED
2 months ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
Information security
fromSecurityWeek
2 months ago

CISA Warns of Exploited SolarWinds, Notepad++, Microsoft Vulnerabilities

CISA warns multiple newly disclosed vulnerabilities in SolarWinds, Notepad++, and Apple have been exploited in the wild and are added to its KEV list.
fromThe Hacker News
2 months ago

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

"The sample retains Shai-Hulud hallmarks and adds GitHub API exfiltration with DNS fallback, hook-based persistence, SSH propagation fallback, MCP server injection with embedded prompt injection targeting AI coding assistants, and LLM API Key harvesting," the company said. The packages, published to npm by two npm publisher aliases, official334 and javaorg, are listed below - Also identified are four sleeper packages that do not incorporate any malicious features -
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Firewalls can fail, passwords can be stolen, but strong encryption remains your last line of defense. InToday's digital world, protect sensitive personal details is more critical and important than ever. The AES algorithm (Advanced Encryption Standard) algorithm is one of the most trusted and widely used way or method for securing data against unauthorized access and frauded. Advanced Encryption Standard supports different levels like 128-bit, 192-bit, and 256-bit encryption, providing strong security for personal data and more.
Information security
Information security
fromTheregister
1 month ago

Cisco warns of two more SD-WAN bugs under active attack

Cisco confirms active exploitation of two new vulnerabilities in Catalyst SD-WAN Manager, requiring immediate patching to prevent file overwriting and privilege escalation attacks.
[ Load more ]