Skip to main content

Security

Thought leadership as well as effective ways to solve cloud security issues.

Linux Defense Evasion – Linux Rootkits | Red Team Series 12-13

In this video portion of our Red Team Series we will cover Linux Rootkits. We'll also be talking about using the Apache2dev app to compile our Rootkit.

Security

Linux Defense Evasion – Hiding Processes | Red Team Series 11-13

In this part of our Hackersploit Security Series we will cover Linux Defense Evasion techniques. We will be taking a look at libprocesshider, and other methods of evading attacks.

Security
Linode Security Digest
Linode

Linode Security Digest May 9-15, 2022

May 13, 2022 by The Linode Security Team
This week, we discuss high-severity vulnerabilities in Rubygems and Rsyslogs as well as the importance of defining secure coding practices.
Security

Linux Persistence Techniques | Red Team Series 10-13

In this video in our Hackersploit Red Team series, we will cover Linux Persistence Techniques. This is a method of establishing and maintaining access to a remote server using back door or web shell.

Security
Linode Security Digest
Linode

Linode Security Digest May 2-8, 2022

May 5, 2022 by The Linode Security Team
This week, we discuss a Linux privilege escalation issue and vulnerabilities related to Rancher and Redis.
Security

Linux Privilege Escalation Techniques | Red Team Series 9-13

In this video in our Hackersploit Red Team Series, we will cover Linux privilege escalation techniques. This includes obtaining root access, and exploiting permissions or binaries to achieve access.

Security
Linode Security Digest
Linode

Linode Security Digest April 24 – May 1, 2022

Apr 28, 2022 by The Linode Security Team
This week, we cover a Jira Security Advisory and other high-severity vulnerabilities in Java and Kubernetes’ ingress-nginx module. 
Security

Windows Privilege Escalation Techniques | Red Team Series 8-13

In the eighth video in our series on Red Team Techniques, we will talk about Privilege Escalation Techniques in Windows. We will cover how to bypass UAC and use both Kernel and Token Impersonation Exploits.

Security

Windows Defense Evasion Techniques | Red Team Series 7-12

In the seventh video in our series on Red Team Techniques we will explore Defense Evasion in Windows. We will cover how to use tools to evade Anti-Virus systems, scripting through PowerShell, and more.

Security
Linode Security Digest
Linode

Linode Security Digest April 8 – 14, 2022

Apr 14, 2022 by The Linode Security Team
We discuss a vulnerability in GNU gzip's zgrep utility, new GitHub functionality that expands visibility into supply chain bugs, and more.
Security

Windows Red Team Credential Access Techniques | Red Team Series 6-12

This guide is part of the HackerSploit Red Team series of guides. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include: keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

Security
Linode Security Digest
Linode

Linode Security Digest April 1 – 7, 2022

Apr 8, 2022 by The Linode Security Team
This week, we discuss Linux kernel and LDAP server vulnerabilities and a zero-day in a popular Java framework.
Security