
ZeroLock: How to Defend Against Ransomware on Linux
Attacks targeting Linux have surged in recent years due to the mass migration of workloads to the cloud and the increase in IoT and other connected devices on the network.
In the News
Click Through Demos

Click Through Demo 1
Leverage ZeroLock threat trees to quickly understand root causes
Click Through Demo 2
Using ZeroLocks lockdown rules to prevent attacks
Click Through Demo 3
ZeroLock Anti-Tamper and Agent Footprint
Click Through Demo 4
ZeroLock detects and stops ransomware launched via a Log4j vulnerability
White Papers

The Risks of Using eBPF for Security
In this white paper, we examine how ZeroLock protects Kubernetes clusters from attacks at runtime.
Protecting Kubernetes Clusters with ZeroLock
In this white paper, we examine how ZeroLock protects Kubernetes clusters from attacks at runtime.
ZeroLock Deployment and Integration
Bruce Schneier wrote that “complexity is the worst enemy of security, and our systems…
Understanding Linux v. Windows Attack Vectors
In the world of information technology there are many threats to end users, organizations…
Threat Reports

Supply Chain Attacks
Supply-chain attacks take advantage of insecure segments of the supply-chain...
Why Hash-Based Scanning: Is Not Enough
Vali Cyber Threat Intelligence Report Fileless attacks are any cyber-attack...
ZeroLock™ Red Team Analytics: Novel Ransomeware
ZeroLock defends against many kinds of attacks, including ransomware. The Vali...
BlackMatter Analysis
Summary BlackMatter is a ransomware campaign that has been terrorizing Linux...
Blog Posts

Unraveling the Jargon: Understanding Endpoint Security and Beyond
Back in 2013, a game-changing technology called EDR burst onto the scene,...
AI Kills Hash Based Detections
Whether it is ChatGPT, GPT4, Bard, or any of the other AI systems competing...
A Brief History of NAS Ransomware
It is no secret that NAS devices are frequently targeted by ransomware...