Sandfly Security
@SandflySecurity
Followers
3K
Following
487
Media
154
Statuses
672
Agentless Linux security. Protect Linux with no agents and no drama. Works almost everywhere with safety and speed.
Christchurch, New Zealand
Joined March 2017
Sandfly protects virtually any Linux system with no endpoint agents and no drama.
0
2
16
Sandfly founder @CraigHRowland joined @TuxDigitalNet Destination Linux for a deep dive into supply chain security realities: malicious VSCode extensions, React2Shell vulnerabilities, and why your open source hobby project may be targeted by serious threat actors.
A new #DestinationLinux has hit the road! ππ§π§π§ https://t.co/ih9IskrUVX Craig Rowland, the CEO of Sandfly Security joins us! Security Deep Dive, ravynOS: macOS BSD, Canonical + AMI bios boots Ubuntu & More! #Linux #FOSS Thank you @SandflySecurity! https://t.co/eemyA94pPR
0
0
3
Check out the full install tutorial here for additional help: https://t.co/y4jlU9Nk2O
digitalocean.com
Deploy Sandfly Security on DigitalOcean for agentless Linux threat detection. Learn setup, secure configuration, monitoring, and automation steps.
0
0
1
We now offer a free five host Profession License of Sandfly with @DigitalOcean 1-Click marketplace deployments. Try out agentless Linux security on your workloads for free. See link below.
1
1
11
@SandflySecurity It's a must-read if you run Linux infra on Droplets and want to deploy intrustion-detection w/o endpoint agents. π― Key Takeaways. ποΈ π Agentless Linux security with Sandflyβno endpoint install, no performance hit. β‘ Instant setup via the DigitalOcean Marketplace 1-Click
0
1
3
A tutorial has been posted with our partners at @digitalocean showing you step-by-step how to deploy Sandfly to agentlessly protect your Linux droplets. Read more below: https://t.co/y4jlU9Nk2O
digitalocean.com
Deploy Sandfly Security on DigitalOcean for agentless Linux threat detection. Learn setup, secure configuration, monitoring, and automation steps.
1
1
10
Protect your @digitalocean workloads using Sandfly with a simple 1-Click marketplace install. In this video we show you how quick and easy it is: https://t.co/ha2Q7ui3SQ
0
1
9
Tor and VPNs can be effective, but often there is a lot more about anonymity than hiding your IP. In this @DestLinuxPod episode Sandfly founder @CraigHRowland discusses the reality of these technologies and how you might burn yourself. https://t.co/y4NeYhm0CU
0
0
2
Also read our blog and download the white paper on SSH key risks that are common on Linux here: https://t.co/HIgiRVCT8r
sandflysecurity.com
Learn how SSH keys can enable lateral movement attacks on Linux and how you can defend your network.
0
0
1
SSH credential theft is a major attack vector on Linux. In this webinar we cover the common SSH key key risks on Linux. We also discuss how we approach the problem of monitoring SSH keys to help security teams identify problems. https://t.co/dTj6Z4UZlk
2
2
5
Sandfly founder @CraigHRowland spoke recently in Oslo on Linux stealth rootkit hunting. Here is a recording of his presentation with details on tactics and techniques he uses to finds evasive Linux rootkits using command line tools. https://t.co/NpfFX5otYU
0
6
12
Your security should be as reliable as your own network and not dependent on a third-party to work.
Important update on the AWS outage and @SandflySecurity customers: Since our product runs on your own servers, sends us no telemetry, does not rely on the cloud, and can run air-gapped, you are not affected by the AWS outage unless you happen to run your instance there. Your
0
2
10
Folks at @SandflySecurity are amazing and equally amazing as their product! Top quality articles and research!
In a world of AI slop, you should know all our articles on Linux malware are lovingly researched and hand-written to be accurate and helpful. If you want to learn more about Linux malware investigation without the AI grift, use this blog link: https://t.co/7vVDvMA9QZ
0
2
4
Sandfly is releasing a free script to find stealth rootkit kernel modules on Linux. It will reveal hidden modules from the recent North Korean rootkit, plus Reptile and other variants. This is what the North Korean rootkit looks like when active. See link in thread for repo.
2
31
85
Full post about the Sandfly 5.5.4 update here: https://t.co/xfiRACkKkZ
sandflysecurity.com
Expanded decloaking for a suspected Chinese or North Korean stealth rootkit on Linux, plus legacy embedded device support.
0
1
4
Sandfly 5.5.4 has full decloaking of the recently leaked North Korean Linux stealth rootkit module, plus enhanced legacy Linux device support. Get the widest Linux threat coverage without the risk of endpoint agents. Read about the update in the link in this thread.
2
2
15
Linux attackers and malware work differently than what we see on Windows. I discuss some of these differences and why ignoring Linux security monitoring is a major mistake may organizations make.
In this episode of the @CloudSecPodcast, @SandflySecurityβs Founder & CEO unpacks their agentless approach, the role of AI in Linux defense, and why itβs time to rethink Linux security. π§ Listen here: https://t.co/gL5VXFk2hl
0
6
30
Join virtual @RonGula as he covers the latest cybersecurity happenings, including our detection coverage of the leaked North Korean Linux rootkit from Phrack magazine.
vRon discussing @HuntressLabs full access to a threat actor desktop system and @DomainTools analysis of North Korean Linux root-kit which is detected out of the box by @SandflySecurity. https://t.co/0UqWGwB8li
0
0
4
A new #DestinationLinux has hit the road! πβ€οΈπ§π§π§ https://t.co/UW9nutB7ji Security Scoop with Sandfly Security! Pebble Watch Returns, Linux Turns 34 π Jill, Ryan & Michael's 1st Linux distro & More! #Linux #SwitchtoLinux Thank you @SandflySecurity! https://t.co/SLk8j0Ic6x
0
1
7