Skip to content
Sandfly Security
  • Product
    • Why Sandfly
    • How Sandfly Works
    • Operation
    • Threats Detected
    • FAQ
    • Testimonials
  • Case Studies
    • University of Massachusetts
    • Testimonials
  • Pricing
  • Resources
    • Blog
    • Videos
    • Documentation
  • About Us
    • About Us
    • Privacy Policy
  • Contact Us
  • TRY IT
Sandfly Security
  • Product
    • Why Sandfly
    • How Sandfly Works
    • Operation
    • Threats Detected
    • FAQ
    • Testimonials
  • Case Studies
    • University of Massachusetts
    • Testimonials
  • Pricing
  • Resources
    • Blog
    • Videos
    • Documentation
  • About Us
    • About Us
    • Privacy Policy
  • Contact Us
  • TRY IT

Month: May 2018

Christchurch Hacker Con 2017 Linux Forensics Slides

June 6, 2018May 30, 2018

The slides for Craig’s talk on command line Linux Forensics from the 2017 Christchurch Hacker Con can be found here: Christchurch Hacker Con 2017 Linux Digital Forensics Presentation The slides cover using basic command line …

READ MOREChristchurch Hacker Con 2017 Linux Forensics Slides

Categories computer forensics, linux forensics Tags linux forensics

Sandfly Documentation Now Online

May 30, 2018

We have posted the Sandfly documentation online for customers and those interested in reading about how to operate the product. Sandfly can help you work through a security incident by automatically pulling over forensic information …

READ MORESandfly Documentation Now Online

Categories linux forensics, sandfly

Sandfly 1.1.11 Updates

May 29, 2018May 28, 2018

Sandfly 1.1.11 is now available. This release has many new Sandflies that detect the following Linux threats: Greatly enhanced process forensics data. Malicious and suspicious process environment capture. Ability to see the IP address of …

READ MORESandfly 1.1.11 Updates

Categories sandfly Tags release, sandfly, update

Linux Malware Persistence with Cron

May 2, 2018

If malware is anything at all, it’s persistent. On Linux, just like Windows, malware once loaded wants to stay loaded. On Windows systems this is usually done with a variety of registry mechanisms. For Linux …

READ MORELinux Malware Persistence with Cron

Categories computer forensics, linux forensics, sandfly Tags computer forensics, linux forensics, malware, persistence, sandfly

Categories

  • computer forensics
  • linux forensics
  • presentation
  • sandfly
  • security
  • videos

Tags

agentless security API binary poisoning computer forensics file entropy forensics incident response interview intrusion detection linux linux forensics linux malware malware masquerading news persistence philosophy presentation presentations release rootkits sandfly sandfly-filescan sandfly update security splunk update videos vodafone

Archives

  • January 2021
  • November 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • March 2019
  • February 2019
  • January 2019
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018

Contact Us

  • +64 03 3792313‬
  • 4 Ash Street Christchurch, New Zealand 8011

Connect With Us


Sandfly Security Twitter

Product Navigation

  • Why Sandfly
  • How Sandfly Works
  • Operation
  • Threats Detected
  • FAQ

General Navigation

  • Pricing
  • Videos
  • Blog
  • Testimonials
  • About Us
  • Partners
  • Contact Us
  • Sign Up
  • Under Attack?

Subscribe for special announcements and product update news

© 2021 Sandfly Security | Website Design by Stimulus Creative
This site uses cookies for analytics and performance monitoring. OKPrivacy Policy