UNC1142: Bitcoin Core Developer Targeted With Multiple Linux Backdoors
In this post, Matt Suiche explores a Linux breach and share some tactics, techniques, and best practices when dealing with it.
Unite your digital forensics solutions and teams across your entire workflow for faster investigations.
Learn MoreUnite your digital forensics solutions and teams across your entire workflow for faster investigations.
Learn MoreUnite your digital forensics solutions and teams across your entire workflow for faster investigations.
Learn MoreCheck out the latest resources and thought leadership for all resources.
Explore All ResourcesCheck out the latest resources and thought leadership for enterprises and corporate digital investigations.
Explore All Enterprise ResourcesCheck out the latest resources and thought leadership for public safety.
Explore All Public Safety ResourcesCheck out the latest resources and thought leadership for forensic service providers.
Explore All Service Provider ResourcesCheck out the latest resources and thought leadership for federal agencies and government.
Explore All Federal Agencies ResourcesCheck out the latest resources and thought leadership for military, defense, and intelligence.
Explore All Military & Intelligence ResourcesBy Rick Andrade
In this post, Matt Suiche explores a Linux breach and share some tactics, techniques, and best practices when dealing with it.
By Rick Andrade
Learn more about how Magnet AXIOM Cyber supports the remote collection of data from Linux operating systems.
To learn more about cookies, which ones we use on our site, and how to change your cookie settings, please view our Privacy Policy*. By continuing to use this site without changing your settings, you consent to our use of cookies in accordance with the Privacy Policy.*