#ssh

[ follow ]
fromThe Hacker News
2 weeks ago

New 'Plague' PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft

The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system authentication and gain persistent SSH access.
Information security
#ansible
fromZDNET
3 months ago

My favorite SSH clients for Android - and why you need them

You can connect to Linux machines via SSH using Android apps like JuiceSSH and Termius.
Information security
fromSecuritymagazine
4 months ago

Devices exposed to remote hacking via Erlang/OTP SSH vulnerability

Erlang/OTP's SSH implementation has a critical vulnerability allowing remote code execution without authentication, requiring urgent attention and action from security teams.
fromZDNET
4 months ago

5 things to do with the Linux terminal on your Android phone - including my favorite

If you have a phone running Android 15, you can enable a full-blown Linux terminal that includes many of the commands you're used to running on Linux.
Gadgets
[ Load more ]