Sandfly 5.4 - Cisco and Juniper Network Device Support
.
Learn more
Under Attack?
Support
Contact Us
Platform
Why Sandfly
Resources
About
Blog
Get Sandfly
Videos
Videos
Destination Linux Cybersecurity Interview with Craig Rowland
March 11, 2025
Linux Security
Linux Password Hash Risks and Security Overview
March 3, 2025
Linux Security
SSH Lateral Movement Risks on Linux Webinar and White Paper
February 27, 2025
Videos
Obsolete Linux Password Hash Threats
February 13, 2025
Videos
Hidden Linux Binary Threats for Intruders and Malware
January 15, 2025
Videos
Immutable File Attack Persistence on Linux
January 9, 2025
Videos
Linux Immutable Malware Process Binary Attack
January 6, 2025
Videos
Linux EDR Detecting Processes Running from Temporary Directory Attack
January 2, 2025
Videos
Linux Process Running with Hidden Binary Name Attack
December 29, 2024
Videos
Linux Process Running from /dev/shm RAM Disk Attack
December 19, 2024
Videos
Deleted Process Binary Attack on Linux
December 19, 2024
Videos
SSH Excessive Keys Risk - Do You Have Too Many SSH Keys?
December 12, 2024
Videos
SSH Authorized Keys2 Backdoor Attack
December 11, 2024
Videos
Risky Business Snake Oilers Interview with Sandfly Security
December 10, 2024
Videos
Default User SSH Authorized Key Risks on Linux
December 9, 2024
Videos
Unsecured and Unencrypted SSH Private Key Threats on Linux
December 8, 2024
Videos
Linux Obsolete Password Hash Risks
December 5, 2024
Videos
Linux nologin Shell Rename Backdoor Attack Detection and Forensics
December 4, 2024
Videos
Linux Default User Password Attack Detection and Forensics
December 3, 2024
Videos
Linux Duplicate User Password Hash Attack
December 2, 2024
Videos
Linux Reverse Shell Detection and Forensics
December 2, 2024
Videos
Rob Joyce Interview - Linux Critical Infrastructure Threats
October 15, 2024
Linux Security
De-Cloaking Linux Stealth Malware and Rootkits: sedexp, Diamorphine, and Reptile
October 13, 2024
Linux Forensics
Evasive Linux Malware Detection Video Presentation (BPFDoor)
November 14, 2023
Linux Security
Using Elasticsearch and Kibana to Investigate Suspicious Linux Activity with Sandfly
May 27, 2020
Videos
The Advantages of Agentless Security and Intrusion Detection for Linux
March 6, 2019
Malware
Hunting for Linux Intrusion Tactics is Better than Searching for Exploit Signatures
February 13, 2019
Videos
Why You Should Be Searching for Linux Anti-Forensics
February 9, 2019
Videos
1000 to 1 Rule of Intrusion Detection
February 7, 2019
Presentations
Christchurch HackerCon 2018 Presentation – Insider’s History of Intrusion Detection Technology
November 1, 2018
Presentations
Linux Cryptomining Malware Podcast Interview
October 18, 2018
Rootkits
Detect Linux Loadable Kernel Module Stealth Rootkits Agentlessly with Sandfly
April 26, 2018
Presentations
Christchurch Hacker Con Linux Digital Forensics Video
April 18, 2018