Secure Remote Access (SRA) should prevent unauthorized access to digital resources, but its weakest link is human error, says cybersecurity expert Kevin Kumpf. Surveys show that for 72% of operational technology respondents, the most significant risk for SRA is third-party connections, while 67% see advanced persistent threats as an increasing worry. The proper configuration, oversight, usage and management of SRA solutions are critical, Kumpf says, calling for improved security practices.

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
Cybersecurity researchers have revealed details about Outlaw, an “auto-propagating” cryptocurrency mining botnet that targets SSH servers with weak credentials. The Romanian-origin malware performs SSH brute-force