Remove Company Remove Conference Remove Information Security Remove Linux
article thumbnail

Uptycs Identifies New Ransomware Binary Targeting Linux

SecureWorld News

The post adds, "This is the first time the group has created a Linux binary. Its locker ransomware infects Linux, NAS, and ESXi hosts and appears to be inspired by Babuk ransomware's leaked source code." Both asymmetric and symmetric encryption make it impossible to decrypt files without the attacker's private key."

Linux 86
article thumbnail

Black Hat USA, Linux Academy’s next stop.

Linux Academy

Linux Academy is officially a sponsor of Black Hat USA. Literally, you can win an extremely rare & enormous Linux Academy penguin. We will test you on common security misconfigurations that open doors to attackers! If they don’t know, your company is probably at risk. appeared first on Linux Academy.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Black Hat USA, Linux Academy’s next stop.

Linux Academy

Linux Academy is officially a sponsor of Black Hat USA. Literally, you can win an extremely rare & enormous Linux Academy penguin. We will test you on common security misconfigurations that open doors to attackers! If they don’t know, your company is probably at risk. appeared first on Linux Academy Blog.

Linux 60
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I remember seeing that a company wanted 10 years or more of Kubernetes experience. So, what, the company wanted one of the creators of Kubernetes? I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security.

Study 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

I remember seeing that a company wanted 10 years or more of Kubernetes experience. So, what, the company wanted one of the creators of Kubernetes? I've got a lot of industry certifications, but having all those paper degrees proved to be a poor equivalent to having actual hands on experience in information security.

Study 40
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

CBS: The hackers sent emails with infected attachments to power company employees, stealing their login credentials and then taking control of the grid systems to cut the circuit breakers at nearly 60 substations. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences.

System 52
article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Anyone who has anyone in the information security community is usually melting under the hot Nevada sun. Ollam: so locks at DEF CON and locks it at any hacker conference. So these informal sessions were always part of the hacker culture. Yes, grasshoppers invaded Las Vegas at the start of hacker summer camp in 2019.