Can a running SSH connection to a rootkit infected VPS be used to attack the remote client?

If a VPS running Debian 10 Xfce as a cloud desktop has been rootkit infected and there is an ongoing SSH connection with X2Go from a client to manage this server, is it possible for an attacker on the VPS to hijack the existing SSH connect… Continue reading Can a running SSH connection to a rootkit infected VPS be used to attack the remote client?

How to reliably detect Browser Exploitation Attacks with BeEF and other JavaScript hooking packages?

"Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use… Continue reading How to reliably detect Browser Exploitation Attacks with BeEF and other JavaScript hooking packages?

Is it still possible to get a virus simply by visiting a website? [closed]

I know this is a duplicate question, but there aren’t any recent updates on the answers given to this question(here and here) and after a few years, I’m sure browser security has improved drastically. I was wondering if it’s still possible… Continue reading Is it still possible to get a virus simply by visiting a website? [closed]

Is Firefox’s new JavaScript support within PDF files a security concern?

Historically, we have learned that many security vulnerabilities and exploits have resulted from allowing document files to contain executable code, whether it be JavaScript, VBScript, another scripting language, or even macros.
As such, s… Continue reading Is Firefox’s new JavaScript support within PDF files a security concern?