Category: Linux

shape
shape
shape
shape
shape
shape
shape
shape
Standard

Plague: The PAM-Based Linux Backdoor

Plague is a newly discovered, highly sophisticated Linux backdoor making headlines across the cybersecurity community. Unlike conventional malware, Plague embeds itself into PAM (Pluggable Authentication Modules)—the core authentication framework for Linux—granting attackers stealthy, persistent access that bypasses standard login mechanisms. Researchers warn that Plague has been quietly evolving since mid-2024 and remained undetected for more than

Standard

SSHStalker: A deep dive into the new IRC-controlled Linux botnet infecting thousands of servers

In early 2026, cybersecurity researchers uncovered a stealthy Linux botnet operation that has infected nearly 7,000 servers worldwide — not with advanced AI or zero-day exploits — but by resurrecting old-school techniques: SSH brute-force compromise, decade-old Linux vulnerabilities, and text-based IRC (Internet Relay Chat) command-and-control (C2) communication. Dubbed SSHStalker, this campaign staggering in scale highlights

Standard

SSH Tunneling: A Complete Guide to Secure Network Access

Introduction In today’s interconnected world, securing data as it travels across networks is more important than ever. Whether you’re accessing a remote server, managing databases, or working from an untrusted network, exposed connections can become easy targets for attackers. SSH tunneling offers a powerful yet lightweight solution by encrypting network traffic and safely forwarding it

Standard

Port Forwarding and Networking

Networks are now involved in nearly every event that occurs in our interconnected world. Whether you’re playing online games, hosting a website, or accessing a home security camera, network management should interface those activities. One technique that helps enable any of those activities is port forwarding. What is Port Forwarding? Port forwarding (also known as

Standard

OpenSSH 10.0: Security Features & Updates

OpenSSH 10.0: A Comprehensive Look at it’s Security-Driven Overhaul OpenSSH 10.0 released on April 9, 2025, marks a turning point for one of the most critical tools in modern IT infrastructure. As the de facto standard for secure remote administration, file transfer, and tunneling, OpenSSH has continuously evolved to address new threats and cryptographic trends.

Standard

Securing SSH Access with Faillock

Faillock is a security module within the PAM (Pluggable Authentication Modules) framework used in Linux systems. The pam_faillock.so module tracks failed login attempts from individual users over a defined time interval. The module automatically locks the user’s account when the number of failed attempts exceeds the configured threshold. This mechanism helps to protect Linux systems

Standard

How to fix OpenSSH vulnerability CVE-2024-6387?

CVE-2024-6387, known as regreSSHion, has been discovered in the OpenSSH server. This vulnerability allows remote unauthenticated attackers to execute arbitrary code on the target server, posing a significant threat to systems that use OpenSSH for secure communications. This article describe how to fix / patch openSSH vulnerability CVE-2024-6387.

Standard

𝐅𝐮𝐭𝐮𝐫𝐞 𝐨𝐟 𝐒𝐒𝐇 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲

In today’s interconnected landscape, SSH is the backbone of secure access, but it’s facing new challenges.