Blog
Detecting Melofee Stealth Backdoor Targeting Red Hat Linux
A new report from Qianxin's X Lab was released detailing new stealth malware targeting Red Hat 7.9 and similar systems: New Zero-Detection Variant of Melofee Backdoor from Winnti Strikes RHEL 7.9…
Rob Joyce Interview - Linux Critical Infrastructure Threats
Watch as Rob Joyce, former head of the NSA Cybersecurity Directorate, discusses threats against Linux critical infrastructure with Sandfly founder Craig Rowland. This video will help security teams…
De-Cloaking Linux Stealth Malware and Rootkits: sedexp, Diamorphine, and Reptile
In this video we demonstrate Sandfly's new file and directory stealth rootkit de-cloaking feature on the sedexp malware targeting Linux. We also show how it works for the Diamorpine and Reptile…
Free Sandfly Linux Incident Response License
Sandfly is offering free licenses for incident response teams. Sandfly's agentless deployment on Linux makes it compatible, fast, and safe giving it unparalleled capability for incident response. Our…
Agentless Password Auditing for Linux White Paper
We have released a white paper on our powerful agentless password auditor for Linux. We discuss the problem of password brute force attacks, and how Sandfly can quickly and safely audit for weak…
Detecting Linux Stealth Rootkits with Directory Link Errors
Detecting stealth rootkits on Linux can be done from the command line. The secret is to ask the same question multiple ways to make sure all answers agree. If they don't all agree, something is…