BlogPress Releases

Atomicorp Raises $1 Million in Seed Round Led by Blu Venture Investors

November 15, 2016

Written by: Bret Kinsella

November 15, 2016 (HERNDON, Va.) – MACH37 Cyber Accelerator today announced that Atomicorp, Inc., a developer of industry leading solutions for the protection and support of cloud servers and Internet of Things devices, has closed a $1 million seed investment round led by Blu Venture Investors. This funding will enable Atomicorp to continue to execute on its […]

Read More...


Tutorial: Basic Installation

September 9, 2015

Written by: Scott Shinn

This is my first shot at doing a basic before & after video mixed with an installation. I think my ambitions got ahead of me here since it ended up being 15 minutes long. Now I like a good video tutorial as much as the next turtle, but I think 15 minutes gets a little […]

Read More...


Tutorial: “Decompromising” a site serving malicious code

August 28, 2015

Written by: Scott Shinn

By popular demand we’ve put together a video tutorial (one of many I hope) on how you can use ASL to solve a problem. In this episode, imagine you are an administrator of a system with multiple customers, all with different sites, applications, and owners. You cant touch the code.. and yet, the code has […]

Read More...


Atomicorp Threat Intelligence System

December 10, 2014

Written by: Michael Shinn

As some users may have noticed we quietly added a new feature to Atomic Secured Linux (ASL), the Atomicorp Threat Intelligence system. Right now the TI is only applied to web events, but we will be rolling the TI into other services as well in the coming months, so the TI will be protecting other services such as mail, FTP, ssh and others. We’ll also be adding it into the ASL firewall so you can automatically blacklist IPs in the various TI databases as you see fit.

Read More...


Stopping symlink attacks with ASL

March 29, 2014

Written by: Michael Shinn

This isnt a new attack, but we’re seeing it used more often so we wanted to highlight a feature we’ve had in ASL for over a year to stop this.  Attackers discovered a way to get access to files on a shared web server in other users accounts.  This lets them get access to things like database usernames and passwords in other accounts, that they dont have access to, giving them the ability to compromise all the accounts on a system from just one single account.  They do this by one or more symlinks to other parts of the system, and you can use ASL to stop this attack.

Read More...


Fighting Spam with ASL

September 11, 2013

Written by: Scott Shinn

Spam is a complex topic. It can be in your mailbox, your browser, your mobile device. It can be blatant and obvious like a flashing popup, or silent and nefarious, hijacking banners and redirecting sites.

If spam were easy to stop, it would have been done already. The reality is: spam in all its various forms is a complex and myriad beast. It covers multiple services, with multiple technologies — just like any other kind of malicious activity. This means it can be an equally complicated problem to manage… so lets talk about how ASL can help manage spam originating from your system when it comes from a web application.

Read More...


Atomic reaches 1 million servers and counting…

February 28, 2013

Written by: Scott Shinn

Some time back in january the Atomic repo for the first time hit 1 million active servers in a single month. These stats dont count devices behind nat, or private repo users so it could have hit this a while ago. I can remember not that long ago when we were reaching maybe 10,000 and thinking that was pretty cool.

Read More...


Blocking outbound spam and viruses with ASL

November 21, 2012

Written by: Michael Shinn

How do you prevent outbound spam and viruses from being sent from your server? Just enable the FW_OUTPUT_MTA feature in ASL.

Read More...


Zero Days: Hype or Reality?

May 14, 2012

Written by: Michael Shinn

While participating in a security conference, I was asked a very important question:  “How do we protect ourselves from Zero Days?”.   My answer: “There is no such thing as zero days”.  Crazy right?  How can that be true?  People report “zero days” everyday, so how can that statement be true?  And how does that answer solve the problem?  Fear not fair reader, all will be revealed!  Lets dig a little deeper and find why there may not really be “zero day” vulnerabilities and why protecting against them isn’t as hard you may think.

Read More...


XMLRPC vulnerability: An oldie but a goodie

April 29, 2012

Written by: Michael Shinn

And oldie but a goodie:  we run a number of honeypots as part of our ongoing efforts to learn what attackers are doing and how to best protect customers and users of our products.  An interesting trend we have seen lately is the use of a very old xmlrpc vulnerability from 2005 being widely used in attacks.    What’s really interesting is that there appears to be a new variant to this old vulnerability.  Could there be holes in new applications using this old vulnerability?  And what should you do about it?

Read More...


1 2 3 4

Protect Your Server Now

©2015 Atomicorp, All Rights Reserved

twitterfacebook