Using AWS Session Manager with Enhanced SSH and SCP Capability

| | Amazon Web Services, aws, Cloud, SCP, SSH
Amazon Web Services recently announced new capabilities in the AWS Systems Manager Session Manager. Users are now capable of tunneling SSH (Secure Shell) and SCP (Secure Copy) connections directly from a local ...
Best of both worlds: automated cloud access management and incident response

Best of both worlds: automated cloud access management and incident response

Cloud adoption has done a lot of good for businesses in driving innovation, agility, and scale. But as organizations adopt cloud services into their IT infrastructure, their security teams are facing a ...
Image Credit: Marc McGil

C2 Hiding

Image Credit: Marc McGil Carrie Roberts, writing at the superlative Black Hills Information Security blog, presents, for your bits related pleasure, the hiding of C2 encapsulated by SSH. Today's Must Read ...
Jack Foster

SSH vs VPN – What’s The Difference?

Going online has several risks, ranging from identity theft to theft of cash and other items. Some privacy is important as you surf the Internet. You have a choice of two technologies- ...
Jack Foster

SSH vs VPN – What’s The Difference?

Going online has several risks, ranging from identity theft to theft of cash and other items. Some privacy is important as you surf the Internet. You have a choice of two technologies- ...
Introducing: native integration with AWS tags for SSH access management

Introducing: native integration with AWS tags for SSH access management

| | aws, SSH
A recent discussion with a customer running its environment on AWS went like this: “I have a very dynamic environment where I can dynamically create and teardown hundreds of servers in minutes ...
DirtyCOW Bug Drives Attackers to A Backdoor in Vulnerable Drupal Web Servers

DirtyCOW Bug Drives Attackers to A Backdoor in Vulnerable Drupal Web Servers

In this post we’ll unpack a short — but no less serious — attack that affected some Linux-based systems, on October 31. Throughout the campaign, the attacker used a chain of vulnerabilities ...
Zero Day protection of SSH Servers with Zero Trust Access

Zero Day protection of SSH Servers with Zero Trust Access

On October 17th, Peter Winter-Smith of NCC Group disclosed a vulnerability in a popular implementation of SSH protocol – libssh. Background The vulnerability originated from a specific implementation of an authentication state ...

How-to Display a Warning Banner Before the Login Prompt

| | General Security, how to, SSH
It is best to have a warning banner displayed before a user is logged in. Below is how you will implement this task. [...] ...

ICS Cybersecurity: Visibility, Protective Controls, Continuous Monitoring – Wash, Rinse, Repeat

| | _NERC, ICS Security, PLC, SSH
As we have talked about in prior blogs, industrial cybersecurity is a journey. This is a journey that is never-ending, as control system technology advancements are adopting information technology (IT) and cloud-based ...
Loading...