Tag: cybersecurity

  • Malware Variant Targets ESXi Environments

    Malware Variant Targets ESXi Environments

    In this blog entry, our researchers provide an analysis of TargetCompany ransomware’s Linux variant and how it targets VMware ESXi environments using new methods for payload delivery and execution. Discovered in June 2021, The TargetCompany ransomware is tracked by Trend Micro as “Water Gatpanapun” and has a leak site under the name “Mallox.” We have…

  • NethSecurity: Open-source Linux firewall

    NethSecurity: Open-source Linux firewall

    NethSecurity is a free, open-source Linux firewall that simplifies network security deployment. It integrates various security features into one platform, including firewalling, intrusion detection and prevention, antivirus, multi-WAN, DNS, and content filtering. NethSecurity has an intuitive interface that delivers real-time insights and control over network security. It is a centralized hub for monitoring and managing…

  • CSSP Calls for Proposals

    CSSP Calls for Proposals

    The Canadian Safety and Security Program (CSSP) is a federally-funded program that supports federal, provincial, territorial, municipal, and Indigenous governments in the development of innovative science and technology advancements that contribute to the safety and security of Canadians. Projects funded by CSSP strengthen Canada’s ability to anticipate, prevent, mitigate, prepare for, respond to, and recover…

  • Linux Commands for Malware Analysis

    Linux Commands for Malware Analysis

    6 Linux Commands I Use for Malware AnalysisVlad Ananin of ANY.RUN shares his favorite Linux commands that help him in analyzing malware. Linux cybersecurity analysts spend countless hours dissecting malicious software to understand its functionality, origin, and impact. Here are six Linux commands that help me in this process, which I believe every professional in…

  • Ebury Malware Still Out There

    Ebury Malware Still Out There

    Ebury is alive but unseen: 400k Linux servers are compromised for cryptocurrency theft and financial gain. One of the most advanced server-side malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theft. Ten years ago we raised awareness of Ebury by publishing…

  • How to Use ‘Tails’: Max Privacy, Anon

    How to Use ‘Tails’: Max Privacy, Anon

    This Linux Distro Is Focused on Maximum Privacy and Anonymity, Here’s How to Use It. (by Dave McKay, from How-to-Geek.) Is online privacy a lost cause? Tails Linux lets you be private online, just as long as you understand its limitations, use it within those limits, and don’t inadvertently blow your cover. The phrase “If…