ssh-keygen

2024-08-27

ssh-keygen is a command provided by OpenSSH to create identity keys.

Read More

xmrig

2024-08-27

XMRig is open-source cryptocurrency mining software. XMRig is often used by cybercriminals on compromised endpoints to monetize their unauthorized ...

Read More

blueboxingtollms-schiffman2024

2024-08-26

Cloud Security Podcast EP154 Mike Schiffman: from Blueboxing to LLMs via Network Security at Google

featuring Mike Schiffman

Cloud Security Podcast, ...

Read More

GitHub dorking - ssh keys

2024-08-26

GitHub dorking is using the search functionality of GitHub to find SSH keys. These are often committed to GitHub by mistake.

Read More

hash algorithm

2024-08-26

A hashing algorithm converts variable length data into a fixed-length set of bytes known as a hash.

Read More

hooks

2024-08-26

In a cybersecurity context, a hook is a technique that intercepts messages, events, or function calls between software components and subsequently ...

Read More

Jynx rootkit

2024-08-26

Jynx (JynxKit) is an LD_PRELOAD rootkit for Linux systems. Jynx provides an SSL-encrypted reverse shell backdoor. ...

Read More

PAM modules - malicious

2024-08-26

Malware may come in the form of a PAM module. Commonly, PAM malware provides backdoor access to an attacker and/or acts as a credential harvester.

Read More

pamgoesrogue-sharma2003

2024-08-26

When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief

by Siddharth Sharma

Unit 42/Palo Alto Networks, 2023 ...

Read More

pid

2024-08-26

A Process ID (PID) is a unique numerical identifier of a process running on a system.

Read More