Twitter | Search | |
Capsule8
Protect your enterprise infrastructure with detection and resilience for Linux systems in any environment. Throw your old EDR out the Windows.
1,244
Tweets
391
Following
2,034
Followers
Tweets
Capsule8 16h
How did a fairly straightforward endeavor – an IT audit – become that monster under the bed? In Part 1 of our series on , Capsule8's expert Cynthia Burke helps demystify all of the dots, dashes and control numbers in an audit
Reply Retweet Like
Capsule8 Aug 11
Interested in joining the Capsule8 team? View our open positions here:
Reply Retweet Like
Capsule8 Aug 10
Tomorrow at 4pm, Capsule8's will be participating in a fireside chat with . Join the virtual meet up here:
Reply Retweet Like
Capsule8 Aug 7
Following his briefing with , talks with 's about their intriguing talk title, unique research study and more:
Reply Retweet Like
Capsule8 retweeted
Cyber Security Hub Aug 7
We're pleased to welcome our Sponsors at the Cyber Security Digital Summit for Financial Services 2020 (Sept 15-16). Secure your place today!
Reply Retweet Like
Capsule8 Aug 5
The counter countdown is on! Today at 1:30pm PT & will present new research on the role of HPCs as detectors for exploits at ! Be sure to tune in to their session and stop by the Capsule8 virtual booth!
Reply Retweet Like
Capsule8 Aug 3
Attending 's virtual event this week? On Wednesday at 1:30 PT, be sure to check out and 's Briefing, Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic. Get a preview here:
Reply Retweet Like
Capsule8 retweeted
Ely Pinto Aug 2
BootHole vulnerability: the solution may be worse than the problem.
Reply Retweet Like
Capsule8 Jul 31
Check out this article from 's on the top 6 cybersecurity trends to watch for next week at , featuring thoughts from Capsule8's Chief Scientist :
Reply Retweet Like
Capsule8 retweeted
Help Net Security Jul 30
Reply Retweet Like
Capsule8 retweeted
AiThority.com Jul 30
Reply Retweet Like
Capsule8 retweeted
Kelly Shortridge Jul 30
Usually my spicy takes aren't proven in <24 hours, but... ICYMI: "We might see more damage from people attempting the mitigation (more on revocations later) rather than attackers leveraging this in dastardly digital crimes." from my post on the Grub vuln:
Reply Retweet Like
Capsule8 Jul 30
Capsule8 is now available on ! With Capsule8, teams using can immediately detect and stop unwanted activity, including risky developer behavior, with an ops-friendly architecture that preserves system uptime and reliability.
Reply Retweet Like
Capsule8 retweeted
Help Net Security Jul 30
Reply Retweet Like
Capsule8 retweeted
Val Bercovici, Anti-Racist #BlackLivesMatter Jul 29
Truly outstanding intro by of to the newly discovered (pre-rootkit bootkit) CVE-2020-10713. Excellent balance of strategic, theoretical and operational risks reviewed.
Reply Retweet Like
Capsule8 retweeted
Richard Johnson Jul 29
Nice “boothole” grub vuln invalidating trusted boot found by our friends at . Kelly from delivers the entertaining and insightful write up as always.
Reply Retweet Like
Capsule8 Jul 29
New - Today researchers disclosed a vuln in GRUB2, CVE-2020-10713, that results in total pwn of Secure Boot in systems using GRUB. explains what makes it cool & why it might grub you the wrong way:
Reply Retweet Like
Capsule8 Jul 28
1 hour until our live webinar begins! Sign up below to join us.
Reply Retweet Like
Capsule8 Jul 27
🚨The countdown is on to tomorrow's live webcast with Capsule8 CPO Rob Harrison and guest speaker Andras Cser of ! Together they will discuss accelerating cloud adoption and the security considerations you should be taking. Register Below:
Reply Retweet Like
Capsule8 retweeted
Kat Sweet 🅰️🚕 Jul 27
Security sales and customer success folks: we’ve got some shiny new positions open at right now!
Reply Retweet Like