Videos

Linux Password Hash Risks and Security Overview

Linux Security
Linux Forensics
Education
White Paper
Videos
March 03, 2025

Linux systems face growing threats, making password security critical. Our white paper and video below on Linux password hashes exposes the risks of outdated hashing algorithms and provides practical…

SSH Lateral Movement Risks on Linux Webinar and White Paper

Linux Security
Linux Forensics
Education
White Paper
Videos
February 27, 2025

Secure Shell (SSH) is a cornerstone of Linux system administration, enabling secure remote access to servers through encrypted communication. However, SSH keys, if not properly managed, can expose…

Obsolete Linux Password Hash Threats

Videos
Education
Linux Forensics
February 13, 2025

Obsolete password hashes on Linux represent a threat for user credentials and lateral movement. An old or weak password hash generally means: The user's password is easily brute forced if stolen…

Hidden Linux Binary Threats for Intruders and Malware

Videos
Education
Linux Forensics
January 15, 2025

Linux attackers and malware often hide their binary payloads. In this video we'll discuss what this threat is, why it is done, and how to find processes running with hidden binaries using command…

Immutable File Attack Persistence on Linux

Videos
Education
Linux Forensics
January 09, 2025

Linux can allow administrators to set files as immutable. This feature prevents the files from being modified or deleted by anyone (even root). However, it can also be used by intruders to maintain…

Linux Immutable Malware Process Binary Attack

Videos
Education
Linux Forensics
January 06, 2025

Processes running with an immutable binary are nearly always malware on Linux. Learn what this attack is, how to automatically detect it, and command line forensics you can use to investigate…