Remove AWS Remove Blog Remove Linux Remove Malware
article thumbnail

Agentless Workload Scanning Gets Supercharged with Malware Scanning

Prisma Clud

Using WildFire in 2021 to analyze malicious files, our threat research team discovered a 73% increase in Cobalt Strike malware samples compared to 2020. The speed, volume and sophistication of modern malware attacks has made them more difficult to detect. This feature complemented existing agent-based protection.

Malware 76
article thumbnail

What’s Free at Linux Academy — May 2019

Linux Academy

By adding free cloud training to our Community Membership, students have the opportunity to develop their Linux and Cloud skills further. Each month, we will kick off our community content with a live study group allowing members of the Linux Academy community to come together and share their insights in order to learn from one another.

Linux 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s Free at Linux Academy — May 2019

Linux Academy

By adding free cloud training to our Community Membership, students have the opportunity to develop their Linux and Cloud skills further. Each month, we will kick off our community content with a live study group allowing members of the Linux Academy community to come together and share their insights in order to learn from one another.

Linux 60
article thumbnail

Cloudy with a chance of threats: Advice for mitigating the top cyber threats of 2024

Lacework

In this blog, we’ll explore the motivations of bad actors, the top threats the Lacework Labs team is seeing, and practical ways to lock down your cloud and protect your data. Workload: Mass scanning for vulnerabilities Workloads, which include computing resources like Linux and Windows hosts, are susceptible to compromise.

article thumbnail

Cybersecurity Snapshot: Cyber Agencies Offer Secure AI Tips, while Stanford Issues In-Depth AI Trends Analysis, Including of AI Security

Tenable

CIS Debian Linux 11 Benchmark v2.0.0 CIS Ubuntu Linux 18.04 LTS Benchmark v2.2.0 — Final Release CIS Ubuntu Linux 22.04 CIS Debian Linux 11 Benchmark v2.0.0 CIS Ubuntu Linux 18.04 LTS Benchmark v2.2.0 — Final Release CIS Ubuntu Linux 22.04 x Benchmark v2.1.0 CIS Cisco IOS XE 17.x x Benchmark v2.1.0

article thumbnail

Ransomware hits the cloud

Lacework

In the last two years, we’ve seen a 600% increase in attacks which is not terribly surprising given ransomware, a form of malware that seeks to encrypt or withhold data unless a ransom is paid, is profitable for attackers. Move over Windows, Linux is next. The adoption of containers and Linux has increased the attack surface.

Cloud 52
article thumbnail

Identifying detection opportunities in cryptojacking attacks

Lacework

This blog post will examine the obstacles adversaries must overcome to succeed in their cryptojacking campaigns and the detection opportunities that arise from it with corresponding Atomic Red Team tests. Lacework Labs often sees remote access methods co-deployed with cryptomining malware (IRC bots, dropped ssh keys, etc.).

Malware 52