How Malicious Actors Abuse Native Linux Tools in Attacks
Credit to Author: Nitesh Surana| Date: Thu, 08 Sep 2022 00:00:00 +0000
Through our honeypots and telemetry, we were able to observe instances in which malicious actors abused native Linux tools to launch attacks on Linux environments. In this blog entry, we discuss how these utilities were used and provide recommendations on how to minimize their impact.
Read more