Blog

Detecting Melofee Stealth Backdoor Targeting Red Hat Linux

Linux Security
Rootkits
Malware
November 13, 2024

A new report from Qianxin's X Lab was released detailing new stealth malware targeting Red Hat 7.9 and similar systems: New Zero-Detection Variant of Melofee Backdoor from Winnti Strikes RHEL 7.9…

Rob Joyce Interview - Linux Critical Infrastructure Threats

Videos
Linux Security
Malware
Education
October 15, 2024

Watch as Rob Joyce, former head of the NSA Cybersecurity Directorate, discusses threats against Linux critical infrastructure with Sandfly founder Craig Rowland. This video will help security teams…

De-Cloaking Linux Stealth Malware and Rootkits: sedexp, Diamorphine, and Reptile

Linux Security
Videos
Rootkits
Malware
October 13, 2024

In this video we demonstrate Sandfly's new file and directory stealth rootkit de-cloaking feature on the sedexp malware targeting Linux. We also show how it works for the Diamorpine and Reptile…

Free Sandfly Linux Incident Response License

Linux Security
Linux Forensics
September 11, 2024

Sandfly is offering free licenses for incident response teams. Sandfly's agentless deployment on Linux makes it compatible, fast, and safe giving it unparalleled capability for incident response. Our…

Agentless Password Auditing for Linux White Paper

White Paper
Education
August 25, 2024

We have released a white paper on our powerful agentless password auditor for Linux. We discuss the problem of password brute force attacks, and how Sandfly can quickly and safely audit for weak…

Detecting Linux Stealth Rootkits with Directory Link Errors

Malware
Rootkits
Linux Forensics
June 25, 2024

Detecting stealth rootkits on Linux can be done from the command line. The secret is to ask the same question multiple ways to make sure all answers agree. If they don't all agree, something is…