Hackers are hunting for vulnerable endpoints to deploy Python malware.
While telnet is considered obsolete, the network protocol is still used by hundreds of thousands of legacy systems and IoT ...
Hackers are on the hunt for open telnet ports in servers after discovering that a version of legacy client-server application ...
A 9.8-severity flaw (CVE-2026-24061) in GNU InetUtils telnetd allows remote authentication bypass and root access in versions ...
Internet security watchdog Shadowserver tracks nearly 800,000 IP addresses with Telnet fingerprints amid ongoing attacks ...
The 11-year-old vulnerability likely impacts many devices that are no longer supported — and presents easy exploit even for ...
Critical vuln flew under the radar for a decade A recently disclosed critical vulnerability in the GNU InetUtils telnet ...