Tag Archives: Security Response

Check your sources! Trojanized open source SSH software used to steal information

Attackers have released a malicious version of Putty, an open source SSH tool, in order to gain unauthorized access to remote computers and steal information.Read More

VENOM vulnerability could expose virtual machines on unpatched host systems

The VENOM vulnerability (CVE-2015-3456) could expose VMs to unauthorized access and data theft. But is it really “bigger than Heartbleed?”

Read More