About us
Investors
Partners
Careers
Solutions
SOLUTIONS
Zero Trust Suite
Quantum-Safe Cryptography (QSC)
SalaX Secure Collaboration
Security Risk Assessment, Quantification & Mitigation
By Topic
Just-in-Time Access
Secure vendor access
Credentials & Secrets Management
Hybrid & multi-cloud access management
Interactive tour: Privileged Access in the Cloud
M2M connections
IT Audits & Compliance
Secure file transfer
By Industry
Managed Service Providers (MSP)
Operational Technology (OT)
Federal Government Security
Products
SECURE ACCESS & SECRETS MANAGEMENT
PrivX™ Hybrid PAM
Universal SSH Key Manager®
SECURE FILE TRANSFER & ENCRYPTION
NQX™ quantum-ready encryption
Tectia™ SSH Client/Server
Tectia™ z/OS
SalaX Secure Collaboration
Secure Mail 2024
Secure Messaging 2024
SalaX Secure Collaboration
Solutions
SOLUTIONS
PrivX Zero Trust Suite
SalaX Secure Collaboration
Strong ID-based access with Entra ID & Zero Trust Suite
Quantum-Safe Cryptography (QSC)
Security Risk Assessment, Quantification & Mitigation
OpenSSH by SSH
Device trust & access and identity verification
Identity-based authentication & converged IAM and PAM
TOPICS
Just-in-Time Access
Secure vendor access
Credentials & Secrets Management
Hybrid & Multi-Cloud Access Management
Interactive tour: Privileged Access in the Cloud
M2M Connections Management
IT Audits & Compliance
Secure File Transfer
INDUSTRIES
Managed Service Providers (MSP)
Operational Technology (OT)
Federal Government Security
Healthcare Data Security
Products
SalaX SECURE COLLABORATION
Secure Mail 2024
Secure Messaging 2024
Secure Sign
SalaX Secure Collaboration
SECURE ACCESS & SECRETS MANAGEMENT
PrivX™ hybrid PAM
PrivX™ OT Edition
Universal SSH Key Manager®
SECURE FILE TRANSFER & ENCRYPTION
Tectia™ SSH Client/Server
Tectia™ SSH Server for IBM z/OS
NQX™ quantum-safe encryption
Services
SSH Risk Assessment™
Professional Services
Support
Contact us
Customer cases
PrivX Zero Trust PAM
Enterprise Key Management UKM
Tectia SFTP for servers & mainframes
SSH Secure Collaboration
Resources
SSH Academy
Content library
Blog
References
Press releases
Downloads
Manuals
Events & Webinars
Media
Legal
Report a vulnerability
Solutions
SOLUTIONS
PrivX Zero Trust Suite
SalaX Secure Collaboration
Strong ID-based access with Entra ID & Zero Trust Suite
Quantum-Safe Cryptography (QSC)
Security Risk Assessment, Quantification & Mitigation
OpenSSH by SSH
Device trust & access and identity verification
Identity-based authentication & converged IAM and PAM
TOPICS
Just-in-Time Access
Secure vendor access
Credentials & Secrets Management
Hybrid & Multi-Cloud Access Management
Interactive tour: Privileged Access in the Cloud
M2M Connections Management
IT Audits & Compliance
Secure File Transfer
INDUSTRIES
Managed Service Providers (MSP)
Operational Technology (OT)
Federal Government Security
Healthcare Data Security
Products
SalaX SECURE COLLABORATION
Secure Mail 2024
Secure Messaging 2024
Secure Sign
SalaX Secure Collaboration
SECURE ACCESS & SECRETS MANAGEMENT
PrivX™ hybrid PAM
PrivX™ OT Edition
Universal SSH Key Manager®
SECURE FILE TRANSFER & ENCRYPTION
Tectia™ SSH Client/Server
Tectia™ SSH Server for IBM z/OS
NQX™ quantum-safe encryption
Services
SSH Risk Assessment™
Professional Services
Support
Contact us
Customer cases
PrivX Zero Trust PAM
Enterprise Key Management UKM
Tectia SFTP for servers & mainframes
SSH Secure Collaboration
Resources
SSH Academy
Content library
Blog
References
Press releases
Downloads
Manuals
Events & Webinars
Media
Legal
Report a vulnerability
About us
Investors
Partners
Careers
SSH Protocol
All
Operational Technology
PQC
PAM
Secure Communications
SSH Key Management
Zero Trust
Life at SSH
Announcements by CEO
Filter by Topic
All
Operational Technology
PQC
PAM
Secure Communications
SSH Key Management
Zero Trust
Life at SSH
Announcements by CEO
UKM
9 min read
| January 9, 2024
The Terrapin Attack Vulnerability in the SSH Protocol - How to Stay Secure
Read More
Subscribe to email updates