🔐 nextgenthreat — Latest Medium Posts

View on GitHub
5 Windows Defender Features Youre Probably Not Using But Should Be

5 Windows Defender Features Youre Probably Not Using But Should Be

Unknown Date • 9 min read
com source http https
7 Cis Security Best Practices I Apply On Every Linux Server I Set Up

7 Cis Security Best Practices I Apply On Every Linux Server I Set Up

Unknown Date • 10 min read
com source https http
7 Hidden Backdoors Ive Found On Compromised Linux Servers And How To Remove Them
7 Things I Check Immediately After Logging Into A Linux Server I Didnt Set Up

7 Things I Check Immediately After Logging Into A Linux Server I Didnt Set Up

Unknown Date • 10 min read
com source http https
How A Controlled Breach Test Helped Me Harden My Linux Server Instantly

How A Controlled Breach Test Helped Me Harden My Linux Server Instantly

Unknown Date • 10 min read
com source https http
How I Accidentally Left A Port Open On My Linux Server And How I Caught It

How I Accidentally Left A Port Open On My Linux Server And How I Caught It

Unknown Date • 9 min read
com source https http
How I Caught A Suspicious Shell Script Running In Tmp And What It Taught Me

How I Caught A Suspicious Shell Script Running In Tmp And What It Taught Me

Unknown Date • 9 min read
com source https http
How I Found A Hidden Backdoor User Account On My Ubuntu Server And What I Did About It
How I Found A Hidden Reverse Shell Running As Www Data And What I Did About It

How I Found A Hidden Reverse Shell Running As Www Data And What I Did About It

Unknown Date • 10 min read
com source http https
How I Found An Unknown Cron Job Mining Crypto On My Ubuntu Server

How I Found An Unknown Cron Job Mining Crypto On My Ubuntu Server

Unknown Date • 10 min read
com source https http
How I Harden My Linux Server In 30 Minutes After Every Fresh Install Ubuntu Red Hat
How I Hunt For Silent Rootkits On Linux Before They Hunt Me

How I Hunt For Silent Rootkits On Linux Before They Hunt Me

Unknown Date • 9 min read
com source https http
How I Rebuild A Linux Server After A Suspected Compromise Step By Step

How I Rebuild A Linux Server After A Suspected Compromise Step By Step

Unknown Date • 9 min read
com source https http
How I Spot A Suspicious Process On My Linux Server Before It Does Damage

How I Spot A Suspicious Process On My Linux Server Before It Does Damage

Unknown Date • 9 min read
com source https http
How I Use Aide To Detect Unauthorized Changes On My Linux And Ubuntu Servers

How I Use Aide To Detect Unauthorized Changes On My Linux And Ubuntu Servers

Unknown Date • 9 min read
com source https http
How I Use Auditd To Catch Hidden Changes On My Linux Server

How I Use Auditd To Catch Hidden Changes On My Linux Server

Unknown Date • 9 min read
com source https http
How I Use Auditd To Catch Silent Security Threats On Linux

How I Use Auditd To Catch Silent Security Threats On Linux

Unknown Date • 9 min read
com source https http
How I Use Bash Scripts To Save Time And Earn More As A Linux Freelancer

How I Use Bash Scripts To Save Time And Earn More As A Linux Freelancer

Unknown Date • 9 min read
com source https http
How I Use Fail2Ban On Ubuntu And Linux To Block Attackers Before They Get In

How I Use Fail2Ban On Ubuntu And Linux To Block Attackers Before They Get In

Unknown Date • 9 min read
com source https http
How To Audit A Linux Or Ubuntu Server Like A Security Consultant

How To Audit A Linux Or Ubuntu Server Like A Security Consultant

Unknown Date • 9 min read
com source https http
How To Automatically Lock Out Ssh Brute Force Attacks On Ubuntu And Red Hat

How To Automatically Lock Out Ssh Brute Force Attacks On Ubuntu And Red Hat

Unknown Date • 10 min read
com source https http
How To Detect Suspicious Activity On A Linux Server In Under 5 Minutes

How To Detect Suspicious Activity On A Linux Server In Under 5 Minutes

Unknown Date • 9 min read
com source https http
I Asked My Linux Server To Predict My Death The Result Froze Me

I Asked My Linux Server To Predict My Death The Result Froze Me

Unknown Date • 9 min read
com source https http
Immutable Infrastructure On Linux Why I Dont Modify Servers After Deployment

Immutable Infrastructure On Linux Why I Dont Modify Servers After Deployment

Unknown Date • 10 min read
com source http https
The 5 Most Dangerous Linux Services If Left Unsecured

The 5 Most Dangerous Linux Services If Left Unsecured

Unknown Date • 9 min read
com source https http
The Hidden Risks Of Ssh Agent Forwarding And How I Avoid Them

The Hidden Risks Of Ssh Agent Forwarding And How I Avoid Them

Unknown Date • 10 min read
com source https http
The Linux Log Hackers Hope You Never Check

The Linux Log Hackers Hope You Never Check

Unknown Date • 9 min read
com source https http
The Linux Rootkit That Hid In Plain Sight How I Finally Detected It

The Linux Rootkit That Hid In Plain Sight How I Finally Detected It

Unknown Date • 10 min read
com source https http
The Linux Service That Almost Let Attackers Slip In And How I Found It Just In Time
The One Linux Security Habit That Exposes You And How I Fixed It

The One Linux Security Habit That Exposes You And How I Fixed It

Unknown Date • 10 min read
com source http https
The One Linux Security Habit That Saved Me From A Silent Breach

The One Linux Security Habit That Saved Me From A Silent Breach

Unknown Date • 10 min read
com source https http
The One Log Entry That Made Me Realize My Linux Server Was Being Scanned

The One Log Entry That Made Me Realize My Linux Server Was Being Scanned

Unknown Date • 10 min read
com source https http
The Ultimate Fusion Linux Ubuntu And Cybersecurity

The Ultimate Fusion Linux Ubuntu And Cybersecurity

Unknown Date • 9 min read
com source https http
What I Check Every Week To Keep My Linux Servers Safe And Stable

What I Check Every Week To Keep My Linux Servers Safe And Stable

Unknown Date • 9 min read
com source https http
What I Check First When A Linux Server Starts Acting Suspicious

What I Check First When A Linux Server Starts Acting Suspicious

Unknown Date • 9 min read
com source http https
What I Do The Moment I Suspect My Ubuntu Server Has Been Compromised

What I Do The Moment I Suspect My Ubuntu Server Has Been Compromised

Unknown Date • 9 min read
com source http https
What I Learned Publishing 5 Technical Blogs In 7 Days On Medium

What I Learned Publishing 5 Technical Blogs In 7 Days On Medium

Unknown Date • 9 min read
com source https http
Why I Always Check Etc Sudoers D On A Compromised Linux Server

Why I Always Check Etc Sudoers D On A Compromised Linux Server

Unknown Date • 9 min read
com source https http
Why I Always Disable Unused Linux Services After Installation

Why I Always Disable Unused Linux Services After Installation

Unknown Date • 9 min read
com source https http
Why I Always Disable Unused Services On Linux Servers

Why I Always Disable Unused Services On Linux Servers

Unknown Date • 9 min read
com source https http
Why I Always Limit Sudo Access On Linux Servers

Why I Always Limit Sudo Access On Linux Servers

Unknown Date • 10 min read
com source https http
Why I Always Monitor Outbound Traffic On My Linux Servers

Why I Always Monitor Outbound Traffic On My Linux Servers

Unknown Date • 10 min read
com source http https
Why I Always Restrict Cron Jobs On Linux Servers

Why I Always Restrict Cron Jobs On Linux Servers

Unknown Date • 9 min read
com source https http
Why I Always Set A Login Banner On Linux Servers And What I Put In It

Why I Always Set A Login Banner On Linux Servers And What I Put In It

Unknown Date • 10 min read
com source http https
Why I Always Set Up File Integrity Monitoring On Linux Servers

Why I Always Set Up File Integrity Monitoring On Linux Servers

Unknown Date • 9 min read
com source http https
Why I Always Use Chattr To Protect Critical Linux Files

Why I Always Use Chattr To Protect Critical Linux Files

Unknown Date • 11 min read
com source https http
Why I Always Verify Linux Packages With Gpg Before Installing

Why I Always Verify Linux Packages With Gpg Before Installing

Unknown Date • 9 min read
com source https http
Why I Check For Hidden Processes Every Week On My Linux Servers And You Should Too
Why I Dont Trust Default Firewall Rules On Linux Servers

Why I Dont Trust Default Firewall Rules On Linux Servers

Unknown Date • 10 min read
com source https http
Why I Enable Multi Factor Authentication Mfa For Ssh On Linux Servers

Why I Enable Multi Factor Authentication Mfa For Ssh On Linux Servers

Unknown Date • 10 min read
com source https http
Why I Enable Multi Factor Authentication Mfa For Ssh On Linux Servers

Why I Enable Multi Factor Authentication Mfa For Ssh On Linux Servers

Unknown Date • 10 min read
com source https http
Why I Never Allow Root Ssh Logins On My Linux Servers

Why I Never Allow Root Ssh Logins On My Linux Servers

Unknown Date • 10 min read
com source http https
Why I Never Trust Pre Installed Packages On Linux Or Ubuntu Servers

Why I Never Trust Pre Installed Packages On Linux Or Ubuntu Servers

Unknown Date • 9 min read
com source https http
Why I Never Trust Pre Installed Packages On Linux Or Ubuntu Servers

Why I Never Trust Pre Installed Packages On Linux Or Ubuntu Servers

Unknown Date • 9 min read
com source https http
Why I No Longer Trust Secure By Default In Linux Server Installs

Why I No Longer Trust Secure By Default In Linux Server Installs

Unknown Date • 10 min read
com source https http
Why I Run Multiple Ssh Keys Instead Of Just One

Why I Run Multiple Ssh Keys Instead Of Just One

Unknown Date • 10 min read
com source http https
Why I Set Email Alerts For Every New User Added To My Linux Server And How You Can Too
Why I Treat Every New Linux Server As Already Compromised

Why I Treat Every New Linux Server As Already Compromised

Unknown Date • 10 min read
com source http https
Why I Use Cold Backups Instead Of Relying Only On Snapshots

Why I Use Cold Backups Instead Of Relying Only On Snapshots

Unknown Date • 10 min read
com source https http
Why I Use Read Only Partitions On My Linux Servers And You Should Too

Why I Use Read Only Partitions On My Linux Servers And You Should Too

Unknown Date • 11 min read
com source http https
Why I Use Read Only Partitions On My Linux Servers And You Should Too

Why I Use Read Only Partitions On My Linux Servers And You Should Too

Unknown Date • 9 min read
com source https http
Why You Should Never Trust Default Configurations On A Fresh Linux Install

Why You Should Never Trust Default Configurations On A Fresh Linux Install

Unknown Date • 10 min read
com source https http
Why Ai Powered Attacks Make Linux Hardening More Urgent Than Ever

Why Ai Powered Attacks Make Linux Hardening More Urgent Than Ever

Unknown Date • 11 min read
https com source aws
Why I Never Trust Default Linux User Accounts And Neither Should You

Why I Never Trust Default Linux User Accounts And Neither Should You

Unknown Date • 10 min read
https com source aws
The First 24 Hours After A Linux Breach My Incident Response Playbook

The First 24 Hours After A Linux Breach My Incident Response Playbook

Unknown Date • 10 min read
com source https http
The Hidden Danger Of Old Users Why I Regularly Audit Etc Passwd On My Linux Servers