News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Attacks on SSH servers through SSH tunneling
Attacks on SSH servers through SSH tunneling

A pioneer in cloud native security has shed light on a long-standing but little-known threat to SSH servers. SSH tunneling allows threat actors to use SSH servers as a slave proxy and route traffic through them. Several months of research by Aqua's Nautilus research team revealed that cybercriminals have found a way to use SSH tunneling to create proxy pools. The cybercriminals primarily aimed at spreading SPAM, but evidence of information theft or cryptomining was also found. As part of the investigation, Team Nautilus found numerous indications that compromised…

Read more

SSH vulnerable: Millions of servers are no longer secure
B2B Cyber ​​Security ShortNews

The SSH protocol has been in use for almost 30 years. Now Bochum researchers have developed an attack that has the potential to undermine, if not even disable, cryptographic SSH protection measures. According to ShadowServer, there are over 1 million SSH servers active in Germany - several million worldwide. The Terrapin attack is a new attack technique on the SSH protocol discovered by researchers at Ruhr University Bochum. The attack can compromise the integrity of secure SSH connections by making targeted adjustments to sequence numbers during the handshake as part of the connection setup. This allows the attacker to remove some messages sent by the client or…

Read more

Old protocols are cyber risks in the network
Benchmarking report on cyber risks in the network

An ExtraHop Cyber ​​Risk and Readiness Benchmarking report reveals the proliferation and risk of internet-exposed protocols on corporate networks. More than 60% of companies expose the remote control protocol SSH to the public Internet and 36% of companies use the insecure FTP protocol. ExtraHop, the leading provider of cloud-native network intelligence, today released the results of the ExtraHop Benchmarking Cyber ​​Risk and Readiness Report showing that a significant percentage of organizations are exposing insecure or highly sensitive protocols such as SMB, SSH and Telnet to the public Internet. Whether intentional or accidental, these vulnerabilities widen the attack surface of any organization...

Read more