AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Free download Quick CPU 4.6.01/25/2024 ![]() Sandfly 4.6.0 features advanced whitelisting and our SSH Hunter is now available to all users for free. Dormant Attacks on Linux: Don't Neglect Either! ![]() Sandfly Security Steve Erbst Anna ButricoĪctive vs. Read this and share it with your Linux admins so they can download a free license and find these dormant threats. ![]() Stan McChrystal describes this malaise of inaction in Risk – A users Guide, Chapter 9 – Action. This is exactly Craig Rowland's point in this article that we don’t pay enough attention to the dormant attacks on Linux systems that are hiding in plain sight. Like the Greendale fault being in a “relatively dormant or hidden state”. It can be described as being in a relatively dormant or hidden state, at least in terms of its prior identification as a significant seismic hazard. The fault line associated with the Christchurch earthquake, known as the Greendale Fault, was not previously well-known or recognized as an active fault line before the earthquake occurred. My hometown was devastated by an earthquake on that took 185 lives. The analogies are plentiful where a threat or risk was known and yet persisted often for years. I mentally sorted through 100’s of analogies I could use and as a Kiwi living in Silicon Valley 3 miles from the Hayward Fault, earthquakes are a constant.
0 Comments
Read More
Leave a Reply. |