OpenSSH will soon deprecate the use of SHA-1 because of the risk of specific attacks against the algorithm.
Compromised credentials and empty SSH passphrases led to the string of attacks on academic supercomputing sites in recent weeks.
Two years may have passed since enforcement of the European Union’s General Data Protection Regulation began, but regulators are just wrapping up the first wave of investigations. Change comes slowly in the realm of data privacy, and it is still too soon to try to improve the regulation.
Authorities in Ukraine arrested a suspect they say is Sanix, a hacker connected to the sale of the huge Collection 1 credential database.
Modern software development relies on open source libraries, even for those applications that are sold commercially and aren’t open source. A pair of reports from Veracode and Synopsys illustrate how these components are introducing vulnerabilities into these applications.