Hackers are targeting unprotected Linux SSH servers to install tools for breaching additional servers, according to cybersecurity researchers at AhnLab Security Emergency Response. The attackers employ brute force to guess SSH credentials and if successful, they either install malware or sell access to the compromised server on the dark web. Researchers recommend using strong, random passwords to prevent such breaches.

The NCSC wants developers to get serious on software security
The NCSC’s new Software Security Code of Practice has been praised by cyber professionals as a significant advancement in enhancing software supply chain security.