Dec. 2, 2022, 6:55 p.m. | Alexa Cardenas

Security Boulevard securityboulevard.com

Most Common SSH Vulnerabilities & How to Avoid Them

Alexa Cardenas

Fri, 12/02/2022 - 10:55




Most common SSH vulnerabilities

Secure Shell uses encryption algorithms.  These algorithms change and as they age, they become more vulnerable.  When they become vulnerable bad guys can take advantage of that to do bad stuff. 


Also, remember how users can use keys rather than a password to login? These SSH keys never expire.  So, imagine Susan is a system admin and she …

ssh vulnerabilities

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Level 1 SOC Analyst

@ Telefonica Tech | Dublin, Ireland

Specialist, Database Security

@ OP Financial Group | Helsinki, FI

Senior Manager, Cyber Offensive Security

@ Edwards Lifesciences | Poland-Remote

Information System Security Officer

@ Booz Allen Hamilton | USA, AL, Huntsville (4200 Rideout Rd SW)

Senior Security Analyst - Protective Security (Open to remote across ANZ)

@ Canva | Sydney, Australia