
Sign up to save your podcasts
Or


It's the Year of the (Clandestine) Linux Desktop!
As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy.
In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker.
Segment Resources:
This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them!
Segment 2: Topic - Threat Modeling Humanoid RobotsWe're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance...
Resources
Finally, in the enterprise security news,
All that and more, on this episode of Enterprise Security Weekly.
Visit https://www.securityweekly.com/esw for all the latest episodes!
Show Notes: https://securityweekly.com/esw-433
By Security Weekly Productions4.9
1414 ratings
It's the Year of the (Clandestine) Linux Desktop!
As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy.
In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker.
Segment Resources:
This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them!
Segment 2: Topic - Threat Modeling Humanoid RobotsWe're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance...
Resources
Finally, in the enterprise security news,
All that and more, on this episode of Enterprise Security Weekly.
Visit https://www.securityweekly.com/esw for all the latest episodes!
Show Notes: https://securityweekly.com/esw-433

2,001 Listeners

374 Listeners

266 Listeners

377 Listeners

652 Listeners

1,022 Listeners

4 Listeners

319 Listeners

418 Listeners

8,019 Listeners

177 Listeners

189 Listeners

74 Listeners

136 Listeners

46 Listeners