Skip to main content

Security

Thought leadership as well as effective ways to solve cloud security issues.

Image features Gardiner Bryant and the text Enable 2FA along with a mobile phone, fingerprint icon, and a physical 2 factor token.

How to Add Two-Factor Authentication to Secure Your Account

In this video, Gardiner shows how to enable two-factor authentication for your Linode account for better account security.
Security
Linode Security Digest
Linode

Linode Security Digest April 10-April 17, 2023

Apr 14, 2023
by The Linode Security Team
We discuss a SvelteKit CSRF protection bypass, a vm2 version sandbox escape, and HashiCorp Nomad/Nomad Enterprise ACL authorization bypasses.
Security
Linode Security Digest
Linode

Linode Security Digest April 3-7, 2023

Apr 7, 2023
by The Linode Security Team
We discuss canceled async Redis commands, a high-severity Elementor Pro access control issue, and sudo replay to create audit trails.
Security
Hackersploit and Incident Response with Fireeye Redline.

Incident Response with FireEye | Final Hackersploit Blue Team Training

In this video, @HackerSploit covers using FireEye's Redline for incident response, which lets users find signs of malicious activity.
Security
Hackersploit and Docker Image Analysis with Trivy.

All-In-One Open Source Security Scanner Docker Image Analysis with Trivy

Trivy is used by cybersecurity experts to find vulnerabilities & IaC misconfigurations, SBOM discovery and more.
Security
Linode Security Digest
Linode

Linode Security Digest March 13-19, 2023

Mar 17, 2023
by The Linode Security Team
In this week's digest, learn about OAuth authentication, ShadowsocksX-NG, an Apache HTTP server vulnerability and more.
Security
Web Application Firewall Overview Header
Maddie Presland

Level Up Application Security with a Web Application Firewall

Mar 16, 2023
by Maddie Presland
What to consider when evaluating a WAF and its implementation, and how to get started with a WAF that meets your application's needs.
Security
Hackersploit and Disk Analysis with Autopsy.

Disk Analysis with Autopsy | HackerSploit Blue Team Training

In this video, HackerSploit will cover using the tool Autopsy® for disk analysis which can reveal what happened to a computer.
Security
Hackersploit and Memory Forensics with Volatility.

Memory Forensics with Volatility | HackerSploit Blue Team Series

In this video, @HackerSploit will cover some examples of how to use Volatility in a Blue Team hacking scenario.
Security

Linux Memory Acquisition with LiME | HackerSploit Blue Team Training

LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices.
Security
Linode Security Digest
Linode

Linode Security Digest February 20-26, 2023

Feb 24, 2023
by The Linode Security Team
We discuss an XSS vulnerability in phpMyAdmin drag-and-drop upload, a buffer overflow vulnerability in the ClamAV scanning library, and more.
Security

Monitor in Real-Time with OSSEC See What’s Taking Place in Your Server

In part 6 of Blue Team training, we'll cover Intrusion detection with OSSEC, an open-source, host-based intrusion detection system.
Security