
Sign up to save your podcasts
Or


Linux is all over the place (sometimes surprising), why is targeting it different? What types of attacks are used? How can we defend against attacks on Linux? We can incorporate recent attacks against SUDO as a timely reference.
This segment is sponsored by Capsule8. Visit https://securityweekly.com/capsule8 to learn more about them!
To register for Capsule8's upcoming webcast "Preparing Linux Hosts for Unexpected Threats" visit https://attendee.gotowebinar.com/register/1056145103342240783?source=SW.
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw140
By Security Weekly Productions4.8
44 ratings
Linux is all over the place (sometimes surprising), why is targeting it different? What types of attacks are used? How can we defend against attacks on Linux? We can incorporate recent attacks against SUDO as a timely reference.
This segment is sponsored by Capsule8. Visit https://securityweekly.com/capsule8 to learn more about them!
To register for Capsule8's upcoming webcast "Preparing Linux Hosts for Unexpected Threats" visit https://attendee.gotowebinar.com/register/1056145103342240783?source=SW.
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw140

7,728 Listeners

371 Listeners

266 Listeners

375 Listeners

638 Listeners

1,020 Listeners

8,007 Listeners

178 Listeners

181 Listeners

314 Listeners

74 Listeners

57 Listeners

136 Listeners

40 Listeners

46 Listeners