ssh-keygen
2024-08-27
ssh-keygen is a command provided by OpenSSH to create identity keys.
Read More
xmrig
2024-08-27
XMRig is open-source cryptocurrency mining software. XMRig is often used by cybercriminals on compromised endpoints to monetize their unauthorized ...
Read More
blueboxingtollms-schiffman2024
2024-08-26
Cloud Security Podcast EP154 Mike Schiffman: from Blueboxing to LLMs via Network Security at Google
featuring Mike Schiffman
Cloud Security Podcast, ...
Read More
GitHub dorking - ssh keys
2024-08-26
GitHub dorking is using the search functionality of GitHub to find SSH keys. These are often committed to GitHub by mistake.
Read More
hash algorithm
2024-08-26
A hashing algorithm converts variable length data into a fixed-length set of bytes known as a hash.
Read More
hooks
2024-08-26
In a cybersecurity context, a hook is a technique that intercepts messages, events, or function calls between software components and subsequently ...
Read More
Jynx rootkit
2024-08-26
Jynx (JynxKit) is an LD_PRELOAD rootkit for Linux systems. Jynx provides an SSL-encrypted reverse shell backdoor. ...
Read More
PAM modules - malicious
2024-08-26
Malware may come in the form of a PAM module. Commonly, PAM malware provides backdoor access to an attacker and/or acts as a credential harvester.
Read More
pamgoesrogue-sharma2003
2024-08-26
When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief
by Siddharth Sharma
Unit 42/Palo Alto Networks, 2023 ...
Read More
pid
2024-08-26
A Process ID (PID) is a unique numerical identifier of a process running on a system.
Read More