Cybercriminals use SSH tunnelling to access VMware ESXiVMware ESXi devices are highly targeted by hackers due to under-monitoring and inherent vulnerabilities.
XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux BackdoorXZ Utils is widely used in Unix-based systems like Linux for data compression.The XZ backdoor allowed remote code execution via SSH login certificates and affected versions 5.6.0 and 5.6.1.