Videos
Linux Password Hash Risks and Security Overview
Linux systems face growing threats, making password security critical. Our white paper and video below on Linux password hashes exposes the risks of outdated hashing algorithms and provides practical…
SSH Lateral Movement Risks on Linux Webinar and White Paper
Secure Shell (SSH) is a cornerstone of Linux system administration, enabling secure remote access to servers through encrypted communication. However, SSH keys, if not properly managed, can expose…
Obsolete Linux Password Hash Threats
Obsolete password hashes on Linux represent a threat for user credentials and lateral movement. An old or weak password hash generally means: The user's password is easily brute forced if stolen…
Hidden Linux Binary Threats for Intruders and Malware
Linux attackers and malware often hide their binary payloads. In this video we'll discuss what this threat is, why it is done, and how to find processes running with hidden binaries using command…
Immutable File Attack Persistence on Linux
Linux can allow administrators to set files as immutable. This feature prevents the files from being modified or deleted by anyone (even root). However, it can also be used by intruders to maintain…
Linux Immutable Malware Process Binary Attack
Processes running with an immutable binary are nearly always malware on Linux. Learn what this attack is, how to automatically detect it, and command line forensics you can use to investigate…