OpenSSH Now Encrypts Secret Keys in Memory Against Side-Channel Attacks

In recent years, several groups of cybersecurity researchers have disclosed dozens of memory side-channel vulnerabilities in modern processors and DRAMs, like Rowhammer, RAMBleed, Spectre, and Meltdown.

Have you ever noticed they all had at least one … Continue reading OpenSSH Now Encrypts Secret Keys in Memory Against Side-Channel Attacks

PuTTY Releases Important Software Update to Patch 8 High-Severity Flaws

The popular SSH client program PuTTY has released the latest version of its software that includes security patches for 8 high-severity security vulnerabilities.

PuTTY is one of the most popular and widely used open-source client-side programs that al… Continue reading PuTTY Releases Important Software Update to Patch 8 High-Severity Flaws

Libssh Releases Update to Patch 9 New Security Vulnerabilities

Libssh2, a popular open source client-side C library implementing the SSHv2 protocol, has released the latest version of its software to patch a total of nine security vulnerabilities.

The Libssh2 library is available for all major distributors of the… Continue reading Libssh Releases Update to Patch 9 New Security Vulnerabilities

36-Year-Old SCP Clients’ Implementation Flaws Discovered

A set of 36-year-old vulnerabilities has been uncovered in the Secure Copy Protocol (SCP) implementation of many client applications that can be exploited by malicious servers to overwrite arbitrary files in the SCP client target directory unauthorized… Continue reading 36-Year-Old SCP Clients’ Implementation Flaws Discovered

LibSSH Flaw Allows Hackers to Take Over Servers Without Password

A four-year-old severe vulnerability has been discovered in the Secure Shell (SSH) implementation library known as Libssh that could allow anyone to completely bypass authentication and gain unfettered administrative control over a vulnerable server wi… Continue reading LibSSH Flaw Allows Hackers to Take Over Servers Without Password

Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows & Linux PCs

WikiLeaks has today published the 15th batch of its ongoing Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell) credentials from targeted Windows and Linux operating systems … Continue reading Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows & Linux PCs