SSH
- APPLICATIONS
New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto
May 28, 2025Ravie LakshmananIoT Security / Cryptocurrency Embedded Linux-based Internet of Things (IoT) devices have become the target of a…
Read More » - APPLICATIONS
Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems
Apr 19, 2025Ravie LakshmananLinux / Malware Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as…
Read More » - APPLICATIONS
Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution
Apr 17, 2025Ravie LakshmananVulnerability / Network Security A critical security vulnerability has been disclosed in the Erlang/Open Telecom Platform (OTP)…
Read More » - APPLICATIONS
Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
Apr 02, 2025Ravie LakshmananCryptojacking / Malware Cybersecurity researchers have shed light on an “auto-propagating” cryptocurrency mining botnet called Outlaw (aka…
Read More » - APPLICATIONS
Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations
Jan 28, 2025Ravie LakshmananRansomware / Threat Intelligence Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging…
Read More »