ZeroLock & SELinux Comparison and Compatibility ZeroLock® is 100% compatible with SELinux. You do not need to disable SELinux protections to use ZeroLock. Overall, SELinux provides powerful, effective MAC for Linux systems. However, SELinux requires detailed...
Securing Linux Infrastructure Linux is the most critical component underlying systems in public clouds, private datacenters, and embedded/ IoT devices—yet there has been a lack of availability of effective tools to secure them. Most offerings are derived from products...
Fileless Attacks vs. Traditional Attacks The following document describes fileless attacks and how they differ from other types of cyber attacks. Additionally, this document examines ways to help prevent fileless attacks as well as the best detection methods for...
Protecting Containers with ZeroLock® The following document describes how the ZeroLock® agent interacts with containers running on Linux® systems. This document addresses a deployment model where ZeroLock agents are deployed on a baremetal Linux OS or Linux VM that...
Securing WordPress with ZeroLock® for Linux® WordPress is one of the most popular content management systems in the world, enabling non-technical users to create beautiful, effective websites. Powering millions of websites, it’s a frequent target of hackers. While...
ZeroLock defends against many kinds of attacks, including ransomware. The Vali Cyber Threat Intelligence team regularly red teams the agent to ensure it responds effectively to sophisticated, evolving threats. The Threat Intelligence team developed a novel ransomware...
Summary BlackMatter is a ransomware campaign that has been terrorizing Linux users since late 2021. The variation is written in C++ and specifically targets VMWare ESXi servers. VMWare ESXi servers are a common target for ransomware attacks because they maintain the...
Explanation of Cryptojacking One of the most prevalent threats facing Linux systems today is cryptojacking. This attack occurs when a threat actor infiltrates a target system and re-appropriates resources to mine cryptocurrency for themselves. Because many Linux...
Vali Cyber Threat Intelligence Report Ransomware is one of the most severe threats in cybersecurity today. After an intruder gains access to the target network or device, they then use malware called “ransomware” to systematically encrypt some or all the data they...