Critical Vulnerability Threatens SSH Security

A groundbreaking attack named “Terrapin” has been uncovered, posing a significant threat to the security of the (SSH) Secure SHell Protocol. SSH, developed nearly 30 years ago to counter password sniffing attacks, is widely used to secure connections in...

SMTP Smuggling ByPasses Email Security Controls

A recently discovered “SMTP smuggling” technique is allowing cyber attackers to sidestep email security protocols like Domain-based Message Authentication, Reporting, and Conformance (DMARC), posing a significant threat to organizations. The method...

Terminated Employee Sabotages Systems

In a case highlighting the importance of removing access upon termination, a disgruntled employee wreaked havoc with his employer’s systems when he was terminated. A former cloud engineer at a bank was terminated for violating company policies, including...

Ubiquiti User Accounts Suffered Data Breach

Ubiquiti users were reporting last week that they were seeing other people’s notification and had access to their devices. The incident was first reported on Reddit, where a user received a notification from UniFi Protect, including an image from someone...