Hackernews posts about Backdoor
- Backdooring Your Backdoors – Another $20 Domain, More Governments (labs.watchtowr.com)
- Patient Monitor Contec CMS8000 Contains a Backdoor (www.cisa.gov)
- Backdoor found in two healthcare patient monitors, linked to IP in China (www.bleepingcomputer.com)
- Someone is slipping a hidden backdoor into Juniper routers across the globe (www.theregister.com)
- Backdooring your backdoors – Another $20 domain, more governments (labs.watchtowr.com)
- Backdoor found in two healthcare patient monitors, linked to IP in China (www.bleepingcomputer.com)
- Backdoor infecting VPNs used "magic packets" for stealth and security (arstechnica.com)
- New VPN Backdoor (www.schneier.com)
- Backdooring Your Backdoors – Another $20 Domain, More Governments (labs.watchtowr.com)
- Coming in Through the Back Door (rethinkingsoftware.substack.com)
- LLMs were backdoored years ago (remyhax.xyz)
- Backdoor in China-made patient monitors raises healthcare security questions (www.tomshardware.com)
- North Koreans clone open source projects to plant backdoors, steal credentials (www.theregister.com)
- Contec CMS8000 Contains a Backdoor (www.cisa.gov)
- Cryptojacking, backdoors abound as fiends abuse Aviatrix Controller bug (www.theregister.com)
- Encryption backdoor debate 'done and dusted' (www.theregister.com)
- Backdoor in Contec CMS8000 monitors may allow faulty patient readings (www.scworld.com)
- Backdoor infecting VPNs used "magic packets" for stealth and security (www.schneier.com)
- Coming in Through the Back Door – By Adam Ard (rethinkingsoftware.substack.com)
- Managing GitHub Repo Backdoors – Repo Deploy Keys (www.letsdodevops.com)
- What are "magic packets," and why do malware developers use them? (arstechnica.com)
- Backdoor in upstream xz/liblzma leading to SSH server compromise (www.openwall.com)
- 1 bug, $50k in bounties, a Zendesk backdoor (gist.github.com)
- TikTok Owner Had 'Backdoor' for CCP Access to US Data, Lawsuit Alleges (www.businessinsider.com)
- A brief history of the U.S. trying to add backdoors into encrypted data (2016) (www.atlasobscura.com)
- The xz sshd backdoor rabbithole goes quite a bit deeper (twitter.com)
- 4-year campaign backdoored iPhones using advanced exploit (arstechnica.com)
- XZ backdoor story – Initial analysis (securelist.com)
- Ottawa wants the power to create secret backdoors in networks for surveillance (www.theglobeandmail.com)
- NSA Backdoor Key from Lotus-Notes (1997) (www.cypherspace.org)
- What we know about the xz Utils backdoor that almost infected the world (arstechnica.com)
- XZ Backdoor: Times, damned times, and scams (rheaeve.substack.com)
- OpenSSH Backdoors (blog.isosceles.com)
- A beetle that heads for the ‘back door’ when eaten by a frog (2020) (www.smithsonianmag.com)
- Planting Undetectable Backdoors in Machine Learning Models (ieeexplore.ieee.org)
- The Linux backdoor attempt of 2003 (2013) (freedom-to-tinker.com)
- Inside the failed attempt to backdoor SSH globally that got caught by chance (doublepulsar.com)
- Deep Dive into XZ Utils Backdoor [video] (www.youtube.com)
- How the XZ Backdoor Works (lwn.net)
- Everything I Know About the XZ Backdoor (boehs.org)
- The xz backdoor thing reminds me of a story (rigor-mortis.nmrc.org)
- Android devices with backdoored firmware found in US schools (www.securityweek.com)
- The most backdoor-looking bug I've ever seen (2021) (words.filippo.io)
- Xz sshd backdoor collecting usernames from logs (isc.sans.edu)