norden.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Moin! Dies ist die Mastodon-Instanz für Nordlichter, Schnacker und alles dazwischen. Folge dem Leuchtturm.

Administered by:

Server stats:

3.4K
active users

#ssh

8 posts8 participants0 posts today
LavX News<p>Unlocking the Power of Linux on Android: 5 Command-Line Hacks for Developers</p><p>With the introduction of the Linux terminal on Android 15, developers can harness the power of command-line utilities right from their mobile devices. Here are five innovative ways to leverage this fe...</p><p><a href="https://news.lavx.hu/article/unlocking-the-power-of-linux-on-android-5-command-line-hacks-for-developers" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/unlocking</span><span class="invisible">-the-power-of-linux-on-android-5-command-line-hacks-for-developers</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/AndroidDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AndroidDevelopment</span></a> <a href="https://mastodon.cloud/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://mastodon.cloud/tags/LinuxTerminal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinuxTerminal</span></a></p>
Carsten<p>Ich habe auf der Projektseite von ubuntuusers.de ein paar meiner Programme mal kurz vorgestellt. Vielleicht kann das eine oder andere Programm jemand von Euch ja gebrauchen.</p><p><a href="https://forum.ubuntuusers.de/topic/kleine-helferlein/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.ubuntuusers.de/topic/kle</span><span class="invisible">ine-helferlein/</span></a></p><p><a href="https://nrw.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://nrw.social/tags/bash" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bash</span></a> <a href="https://nrw.social/tags/shell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shell</span></a> <a href="https://nrw.social/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://nrw.social/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a> <a href="https://nrw.social/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://nrw.social/tags/backup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backup</span></a> <a href="https://nrw.social/tags/git" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>git</span></a> <a href="https://nrw.social/tags/github" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>github</span></a> <a href="https://nrw.social/tags/codeberg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codeberg</span></a> <a href="https://nrw.social/tags/server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>server</span></a> <a href="https://nrw.social/tags/mount" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mount</span></a> <a href="https://nrw.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://nrw.social/tags/repository" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>repository</span></a></p>
takeonrules<p>Still working through <a href="https://dice.camp/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> switch from <a href="https://dice.camp/tags/macos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macos</span></a>. With <a href="https://dice.camp/tags/emacs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>emacs</span></a> and <a href="https://dice.camp/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> keys in place, everything is going well. There are some key binding antics I'm coping with, but really I use 3 apps: browser, emacs, and terminal.</p>
Yorgos Saslis<p>Fellow <a href="https://chaos.social/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> users ! I need your help! </p><p>Context: More and more people are trying out <span class="h-card" translate="no"><a href="https://toot.radicle.xyz/@radicle" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>radicle</span></a></span> as a <a href="https://chaos.social/tags/decentralized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>decentralized</span></a> <a href="https://chaos.social/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> alternative. </p><p><a href="https://chaos.social/tags/Radicle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Radicle</span></a> has a different identity system than Microsoft's, so when moving projects over to Radicle it is important to know which GH user the Radicle projects belong to. </p><p>What would be a way you would use to link your Radicle and GitHub identities?</p><p>(Radicle identity is based on <a href="https://chaos.social/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> keys, specifically `did:key`).</p><p>Boosts for reach - appreciated.</p>
Mac<p>Kurz nach Offenlegung: <a href="https://mastodon.social/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChatGPT</span></a> und <a href="https://mastodon.social/tags/Claude" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Claude</span></a> liefern Exploit für kritische <a href="https://mastodon.social/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a>-Lücke </p><p><a href="https://www.golem.de/news/kurz-nach-offenlegung-chatgpt-und-claude-liefern-exploit-fuer-kritische-ssh-luecke-2504-195579.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/kurz-nach-offenl</span><span class="invisible">egung-chatgpt-und-claude-liefern-exploit-fuer-kritische-ssh-luecke-2504-195579.html</span></a></p><p><a href="https://mastodon.social/tags/Sicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheit</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/KI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KI</span></a> <a href="https://mastodon.social/tags/LLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLM</span></a></p>
OTX Bot<p>Threat Infrastructure Uncovered Before Activation</p><p>Between November 2024 and April 2025, a set of domains and servers impersonating an Iraqi academic organization and fictitious UK tech firms were tracked. The infrastructure, while dormant, exhibited characteristics similar to APT34 (OilRig), including shared SSH keys, structured websites, and decoy HTTP behavior on M247-hosted servers. Key observations include the use of port 8080 for fake 404 responses, consistent SSH fingerprint reuse, and domains registered through P.D.R. Solutions with regway.com nameservers. The setup suggests deliberate pre-operational staging, offering defenders an early warning opportunity. Detection strategies include monitoring SSH fingerprints, HTTP response patterns, and domain registration behaviors.</p><p>Pulse ID: 68082a17ee5771aa012e93c3<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/68082a17ee5771aa012e93c3" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/68082</span><span class="invisible">a17ee5771aa012e93c3</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-22 23:45:27</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/APT34" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT34</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> <a href="https://social.raytec.co/tags/ICS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICS</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OilRig" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OilRig</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://social.raytec.co/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Django<p>Hab mal kleinere Rechtschreibkorrekturen am BLOG-Beitrag zum Thema "TOFU - Trust On First Use - SSH Zertifikate" vorgenommen. </p><p><a href="https://dokuwiki.nausch.org/doku.php/linux:ssh:tofu_und_cert" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dokuwiki.nausch.org/doku.php/l</span><span class="invisible">inux:ssh:tofu_und_cert</span></a></p><p><a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/tofu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tofu</span></a> <a href="https://mastodon.social/tags/dokuwiki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dokuwiki</span></a></p>
ADMIN magazine<p>From the ADMIN Update newsletter: Jeff Layton shares what you should know before you move into HPC<br><a href="https://www.admin-magazine.com/Articles/What-to-Know-Before-Moving-into-HPC?utm_source=mam" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/Articles/Wh</span><span class="invisible">at-to-Know-Before-Moving-into-HPC?utm_source=mam</span></a><br><a href="https://hachyderm.io/tags/HPC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HPC</span></a> <a href="https://hachyderm.io/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://hachyderm.io/tags/cluster" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cluster</span></a> <a href="https://hachyderm.io/tags/commands" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>commands</span></a> <a href="https://hachyderm.io/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://hachyderm.io/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://hachyderm.io/tags/SCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SCP</span></a> <a href="https://hachyderm.io/tags/NFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NFS</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@shoppingtonz" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>shoppingtonz</span></a></span> <span class="h-card" translate="no"><a href="https://mas.to/@alternativeto" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>alternativeto</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> also every <a href="https://infosec.space/tags/Tunneling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tunneling</span></a> - regardless if <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> or <a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> or whatever - will inevitably introduce <a href="https://infosec.space/tags/latency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>latency</span></a> (unless you happen to be customer of a shitty <a href="https://infosec.space/tags/ISP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ISP</span></a> with horrible <a href="https://infosec.space/tags/peering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>peering</span></a> and thus can cut down on hops needed, which is AFAIK only a theoretical scenario)...</p><ul><li>Outside of circumventing <a href="https://infosec.space/tags/Geoblocking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Geoblocking</span></a> and bypassing <a href="https://infosec.space/tags/IP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IP</span></a>-based <a href="https://infosec.space/tags/Banning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Banning</span></a> (i.e. for <a href="https://infosec.space/tags/Cheating" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cheating</span></a>) I've not seen any use-cases.</li></ul><p>In fact I stopped using <a href="https://infosec.space/tags/HEnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HEnet</span></a> <a href="https://infosec.space/tags/Tunnelbroker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tunnelbroker</span></a> and <a href="https://infosec.space/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a>-<a href="https://infosec.space/tags/GIF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GIF</span></a>-Tunneling because it created more issued than it solved on my <a href="https://infosec.space/tags/IPv4only" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4only</span></a> <a href="https://infosec.space/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a> connection…</p>
The New Oil<p>Critical <a href="https://mastodon.thenewoil.org/tags/Erlang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Erlang</span></a>/OTP <a href="https://mastodon.thenewoil.org/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> RCE bug now has public exploits, patch now</p><p><a href="https://www.bleepingcomputer.com/news/security/public-exploits-released-for-critical-erlang-otp-ssh-flaw-patch-now/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/public-exploits-released-for-critical-erlang-otp-ssh-flaw-patch-now/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
menschenfreund<p>Funny, how a lot of people claim you can put ssh_keys: into the users: module in <a href="https://hessen.social/tags/cloudinit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudinit</span></a> <br><a href="https://hessen.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a></p>
stfn :raspberrypi: :python:<p>Random useful linux CLI thing I just learnt.</p><p>If you don't want to see all that lengthy text after sshing to a machine, just do</p><p>touch ~/.hushlogin</p><p>(This command creates an empty file ".hushlogin" in your user home directory)</p><p>on the machine you are sshing to. Now there won't be any welcome messages to clutter your terminal, just a prompt.</p><p><a href="https://fosstodon.org/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://fosstodon.org/tags/bash" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bash</span></a> <a href="https://fosstodon.org/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a></p>
LavX News<p>Critical Vulnerability in Erlang/OTP SSH Exposes Devices to Remote Code Execution</p><p>A newly discovered vulnerability in the Erlang/OTP SSH implementation, tracked as CVE-2025-32433, allows unauthenticated attackers to execute remote code. With public exploits now available, the urgen...</p><p><a href="https://news.lavx.hu/article/critical-vulnerability-in-erlang-otp-ssh-exposes-devices-to-remote-code-execution" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/critical-</span><span class="invisible">vulnerability-in-erlang-otp-ssh-exposes-devices-to-remote-code-execution</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.cloud/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://mastodon.cloud/tags/Erlang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Erlang</span></a></p>
The New Oil<p>Critical <a href="https://mastodon.thenewoil.org/tags/ErlangOTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ErlangOTP</span></a> <a href="https://mastodon.thenewoil.org/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> pre-auth RCE is 'Surprisingly Easy' to exploit, patch now</p><p><a href="https://www.bleepingcomputer.com/news/security/critical-erlang-otp-ssh-pre-auth-rce-is-surprisingly-easy-to-exploit-patch-now/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/critical-erlang-otp-ssh-pre-auth-rce-is-surprisingly-easy-to-exploit-patch-now/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
0x40k<p>Whoa, heads up cybersecurity folks! There's a particularly nasty bug making the rounds: **CVE-2025-32433** in Erlang/OTP SSH. And yes, it scored a perfect CVSS 10.0 🤯.</p><p>We're talking potential **unauthorized remote code execution** here. Basically, an attacker can sneak SSH messages through *before* any authentication even happens. Think about that for a second. If your SSH daemon happens to be running as root... well, that's pretty much game over for the system.</p><p>This isn't just a minor issue; it impacts *anyone* using the Erlang/OTP SSH implementation.</p><p>**The good news?** Patches are available! You'll want to update to one of these versions ASAP:<br>* OTP-27.3.3<br>* OTP-26.2.5.11<br>* OTP-25.3.2.20</p><p>Speaking as a pentester, gotta say, that's a clever (and worrying!) vulnerability path 😉. Another thing to keep in mind: your typical automated vulnerability scanners might completely miss this one due to the pre-auth nature.</p><p>So, what's your take? Have any of you run into this yet or started testing for it? Curious to know what tools you're finding effective for detection or exploitation testing! Let's discuss 👇</p><p><a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Erlang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Erlang</span></a> <a href="https://infosec.exchange/tags/OTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTP</span></a> <a href="https://infosec.exchange/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> <a href="https://infosec.exchange/tags/PatchNow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PatchNow</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a></p>
Neustradamus :xmpp: :linux:<p><a href="https://mastodon.social/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a> 10.0 has been released (<a href="https://mastodon.social/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> / <a href="https://mastodon.social/tags/SecureShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureShell</span></a> / <a href="https://mastodon.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a>) <a href="https://openssh.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">openssh.com/</span><span class="invisible"></span></a></p>
քʏʀǟȶɛɮɛǟʀɖ<p><a href="https://log.pyratebeard.net/entry/20250418-a_tale_of_two_gits.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">log.pyratebeard.net/entry/2025</span><span class="invisible">0418-a_tale_of_two_gits.html</span></a></p><p>a tale of two gits - using my main git config to commit and push code as different users to different remote accounts</p><p><a href="https://harbour.cafe/tags/git" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>git</span></a> <a href="https://harbour.cafe/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://harbour.cafe/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://harbour.cafe/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> </p><p>rss: <a href="https://log.pyratebeard.net/rss.xml" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">log.pyratebeard.net/rss.xml</span><span class="invisible"></span></a></p>
pcyx<p>Critical Erlang/OTP SSH pre-auth RCE is 'Surprisingly Easy' to exploit, patch now</p><p><a href="https://www.bleepingcomputer.com/news/security/critical-erlang-otp-ssh-pre-auth-rce-is-surprisingly-easy-to-exploit-patch-now/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/critical-erlang-otp-ssh-pre-auth-rce-is-surprisingly-easy-to-exploit-patch-now/</span></a></p><p><a href="https://c.im/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://c.im/tags/erlang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>erlang</span></a> <a href="https://c.im/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://c.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://c.im/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a></p>
LavX News<p>Critical Erlang/OTP SSH Vulnerability Exposes Systems to Remote Code Execution</p><p>A severe vulnerability in the Erlang/OTP SSH daemon allows unauthenticated remote code execution, prompting urgent action from developers and organizations. With a maximum severity score of 10.0, this...</p><p><a href="https://news.lavx.hu/article/critical-erlang-otp-ssh-vulnerability-exposes-systems-to-remote-code-execution" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/critical-</span><span class="invisible">erlang-otp-ssh-vulnerability-exposes-systems-to-remote-code-execution</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.cloud/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://mastodon.cloud/tags/Erlang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Erlang</span></a></p>
Daniel Wayne Armstrong<p>Disable password logins on the SERVER in favour of using SSH keys for authentication. Create the necessary SSH keys on a NetBSD CLIENT that will be used to secure access to remote devices:</p><p><a href="https://www.dwarmstrong.org/netbsd-ssh-keys/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">dwarmstrong.org/netbsd-ssh-key</span><span class="invisible">s/</span></a></p><p><a href="https://fosstodon.org/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://fosstodon.org/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> <a href="https://fosstodon.org/tags/RunBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RunBSD</span></a> <a href="https://fosstodon.org/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a></p>