Paul Jespersen (@pauljespersen) 's Twitter Profile
Paul Jespersen

@pauljespersen

Cybersecurity, Startups, VC, Tech, Linguistics, History, Texas, Photography, Lacrosse, Flyfishing, Skiing, Travel. Founder @PRESecurityAI

ID: 38895729

calendar_today09-05-2009 17:56:58

2,2K Tweet

173 Takipçi

829 Takip Edilen

Paul Jespersen (@pauljespersen) 's Twitter Profile Photo

Great to be on the Sandfly Security team. Great agentless solution for Linux cybersecurity. #freemium version of our new 4.0 release available now at sandflysecurity.com

Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

I am of the opinion that Linux breaches are *vastly* under-reported due to lack of reliable and consistent monitoring of systems. Long dwell times make ransomware attacks like this possible. zdnet.com/article/linux-…

Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

In this video I demonstrate tracking compromised SSH credentials across a group of Linux hosts. A lot of Linux malware/intruders search for private keys after access to enable lateral movement. It allows things to get out of hand very quickly. youtube.com/watch?v=T5QQHU…

Sandfly Security (@sandflysecurity) 's Twitter Profile Photo

Sandfly 4.2 is out and now has automatic host discovery for cloud and DHCP address pools, plus is more than twice as fast as before! Securing #Linux is simpler than ever with our agentless security platform. Get your free license and learn more below. hubs.ly/Q01pKxft0

Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

Testing latest Sandfly against Linux kernel 6.0.3. No updates required. Sandfly works on rolling distros like Tumbleweed to those that are a decade old. Agentless Sandfly is where agents can't be.

Testing latest Sandfly against Linux kernel 6.0.3. No updates required. Sandfly works on rolling distros like Tumbleweed to those that are a decade old. Agentless Sandfly is where agents can't be.
Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

One of the biggest issues with Linux EDR is that they basically took Windows anti-virus scanning ideas and applied it to Linux. Here is why that's a bad idea..1/N 🧵

Sandfly Security (@sandflysecurity) 's Twitter Profile Photo

Sandfly now sends SSH key credential data directly to #Splunk with our App update. Our agentless security platform for Linux collects SSH data to track, monitor, and detect compromised keys easily with Splunk. Learn more below. hubs.ly/Q01rSycc0

Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

Linux malware is increasingly using evasion tactics for EDR. What we do below is use malware evasion tactics against malware. Can't beat em' join em'. Here's how you should change your thinking to find cloaked malware on Linux in this thread.

Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

Getting some final Christmas touches on an upcoming release. A detection for a neat trick from Tim Brown hiding Linux processes with a mount command. gist.github.com/timb-machine/6…

Getting some final Christmas touches on an upcoming release. A detection for a neat trick from <a href="/timb_machine/">Tim Brown</a> hiding Linux processes with a mount command. 

gist.github.com/timb-machine/6…
Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

If you want to quickly find SSH keys used by this and other Linux malware, simply paste it into Sandfly Security SSH Hunter. We collect SSH public keys on all systems automatically. If you see any hosts show up, you have a problem. Easy.

If you want to quickly find SSH keys used by this and other Linux malware, simply paste it into <a href="/SandflySecurity/">Sandfly Security</a> SSH Hunter. We collect SSH public keys on all systems automatically. If you see any hosts show up, you have a problem. Easy.
Sandfly Security (@sandflysecurity) 's Twitter Profile Photo

Sandfly has around 1,200 modules designed to perform security sweeps against Linux for this and many more types of unusual behaviors. Our agentless deployment is fast and low risk with results in seconds. Contact us to find out more or get a free license today at our website.

Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

Linux malware that compromises OpenSSH, drops malicious keys, and installs stealth rootkits. Sandfly finds all these activities, even on embedded devices, agentlessly. SSH authorized_keys management is an unmonitored mess in most orgs and must be monitored...

Linux malware that compromises OpenSSH, drops malicious keys, and installs stealth rootkits. Sandfly finds all these activities, even on embedded devices, agentlessly. SSH authorized_keys management is an unmonitored mess in most orgs and must be monitored...
Paul Jespersen (@pauljespersen) 's Twitter Profile Photo

Did a thing. #startuplife We aim to change cybersecurity from reactive to proactive w our predictive AI cybersecurity solutions. Predict & Prevent.

Heath Ahrens (@heathahrens) 's Twitter Profile Photo

The blueprint for success in the AI era is clear: • Elevate humans to strategic roles • Make AI decisions transparent • Build small, elite teams • Automate aggressively Companies that adapt will thrive and those that don't will die.

Richard Stiennon (@stiennon) 's Twitter Profile Photo

Think about this. Now think of the implications for SOC teams, vulnerability management teams, and DLP responders. The cybersecurity industry is being turned on its head.