Supply Chain Attacks

Supply-chain attacks take advantage of insecure segments of the supply-chain of a target. An attacker will manipulate the elements used in the production process of the target, and thereby produce a vulnerability. In many modern examples this involves compromising...

Why Hash-Based Scanning: Is Not Enough

Vali Cyber Threat Intelligence Report Fileless attacks are any cyber-attack which does not write any files to disk on the target system. This kind of attack has grown in popularity over recent years due to some of the distinct advantages they hold over more...

Understanding Linux v. Windows Attack Vectors

Understanding Linux v. Windows Attack Vectors In the world of information technology there are many threats to end users, organizations, and customers. Malicious actors tailor their attacks to fit the vulnerabilities of the target, objective of the attack, and...

ZeroLock® & SELinux Comparison and Compatibility

 ZeroLock & SELinux Comparison and Compatibility ZeroLock® is 100% compatible with SELinux. You do not need to disable SELinux protections to use ZeroLock. Overall, SELinux provides powerful, effective MAC for Linux systems. However, SELinux requires detailed...

Securing Linux Infrastructure

Securing Linux Infrastructure Linux is the most critical component underlying systems in public clouds, private datacenters, and embedded/ IoT devices—yet there has been a lack of availability of effective tools to secure them. Most offerings are derived from products...

Fileless Attacks vs. Traditional Attacks

Fileless Attacks vs. Traditional Attacks The following document describes fileless attacks and how they differ from other types of cyber attacks. Additionally, this document examines ways to help prevent fileless attacks as well as the best detection methods for...

Protecting Containers with ZeroLock®

Protecting Containers with ZeroLock® The following document describes how the ZeroLock® agent interacts with containers running on Linux® systems. This document addresses a deployment model where ZeroLock agents are deployed on a baremetal Linux OS or Linux VM that...