An exploit developed by GitHub user YassDEV221608 targets a significant vulnerability in the OpenSSH protocol, posing a significant threat to users relying on it for secure communication. The flaw is a race condition within OpenSSH’s server daemon, specifically if a client does not authenticate within the required LoginGraceTime, and has been confirmed not to affect OpenBSD systems. It allows attackers to gain unauthorized root access by executing code.

NHS suppliers required to meet robust measures under Cyber Bill
The UK government has released its Cyber Security and Resilience Bill plans, seeking to bolster public service cyber defences, especially for the NHS. The legislation,