by Alan Deeter | Jan 18, 2016 | Open Source, SSH, Technical, Threats, Uncategorized |
Security firm Qualys has identified a zero-day vulnerability in OpenSSH clients that could allow a malicious server to steal private user keys, according to an eWeek article. The vulnerability is present in all OpenSSH client versions released since March 7, 2010...
by Alan Deeter | Dec 22, 2015 | Executive Reading, Incidents, SSH, Threats, Uncategorized |
Juniper Networks announced last week that an internal code review revealed two critical security vulnerabilities in ScreenOS, the Linux derived operating system that powers approximately 26,000 Netscreen firewall devices on the internet today. The review uncovered two...
by Alan Deeter | Dec 9, 2015 | Best Practices, Executive Reading, Expert Opinion, SSH |
The SANS Institute reports “up to 80% of [IT security] breaches may originate in the supply chain, and they are making sure your customers know how to protect themselves — from you. In a recent white paper they describe best practices to protect your customers...
by Alan Deeter | Nov 26, 2015 | Executive Reading, Incidents, SSH, Threats |
Many Cisco security appliances contain a common default SSH key that could allow an attacker to connect and take almost any action he chooses. “A vulnerability in the remote support functionality of Cisco WSAv, Cisco ESAv, and Cisco SMAv Software could allow an...