How does HashiCorp Boundary pair with Cmd's eBPF monitoring solution for Linux?
A blog about security and protections
in Linux, DevOps, and the Cloud
By: Brian Gladstein
Yet another Linux attack has surfaced recently that has impacted thousands of servers. It’s a ransomware called Lilocked (aka Lilock or Lilu) and likely takes advantage of a known Exim vulnerability or possibly old versions of WordPress to gain system entry. Once inside, Lilu encrypts the data on the server and renames the files with a…
By: Brian Gladstein
Hacker Summer Camp is now safely in our rearview mirror, and what a week it was. From the corporate zoo that was Black Hat, to the wild west of Def Con 27, to some great side-events like the Diana Initiative, BSides Las Vegas, and Queercon, the cybersecurity scene in Las Vegas did not disappoint. Cmd was there in…
By: Jake King
Today, the Cmd team celebrates a major milestone. It’s a landmark for us that we believe is also important to the future of the cybersecurity space. We’re humbled and excited to announce our Series B funding round of $15 million USD led by GV (formerly Google Ventures), with participation from Expa, Amplify Partners and additional strategic investors — bringing Cmd’s…
Linux’s flexibility means common developer behaviors can introduce serious security issues. We identify four scenarios and what you can do to avoid them.
This episode of the Risky Business podcast has Adam Cardillo and Curtis Simpson of HPE ITOC discuss the dual role Cmd plays in their Linux environments.
Cmd collects data about what happens on your Production Linux servers, but do you know how that data is structured, or what it contains? Read to find out.
The National Security Agency and Federal Bureau of Investigation detail a previously undisclosed Linux malware strain named “Drovorub.”
In this post, we explore some of the core ways that integrating ChatOps as part of permissions processes can improve security—and more.
TL;DR: Compliance can be a huge point of stress for cloud-first companies. In this co-written article with Audit Liaison, we’re sharing a handful of core actions to get your cloud audit-ready. Back in the “good” old days, audits involved much less data and way more paper. Today, a compliance audit can encompass massive amounts of…
Cmd provides the fastest, easiest way to know what’s happening in your Linux environment, who’s logging in, and what they are doing.Activate Your Free Account arrow_forward