Linux Security
    Linux Security
    Linux Security

    SSH Attack Vector: Dormant & Forgotten Keys

    Date 16 Sep 2020
    Category Cryptography
    946
    Posted By Brittany Day
    LS Hmepg 337x500 24

    SSH keys play a critical role in server and network security, yet are too often overlooked by admins, IT professionals and security teams.

    SSH keys are everywhere. However, despite their widespread use and high-privilege access, they’re often overlooked by IT and security teams. Meanwhile, malicious actors seek to exploit unmanaged and unprotected keys to perform SSH attacks and spread through networks undetected.

    In this blog, we’ll discuss the underlying problem of SSH key sprawl and how to prevent emerging SSH attacks, such as FritzFrog and Lemon_Duck, by implementing proper key management and security practices.

    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.