YoVDO

Fileless Attack - Detecting the Undetectable

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cybersecurity Courses Encryption Courses Linux Security Courses Malware Detection Courses Container Security Courses Cloud-Native Security Courses eBPF Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of fileless attacks and their detection in this informative conference talk. Delve into the world of advanced cybersecurity threats as Carolina Valencia from Aqua Security breaks down the concept of fileless attacks, their growing prevalence in Linux and container environments, and effective detection methods. Learn how these stealthy attacks operate by loading malware directly into memory, evading common defenses and static scanning. Discover the use of compression and encryption techniques employed by attackers to cloak malicious files. Through a practical demonstration, gain insights into creating a fileless attack and detecting unexpected activity using eBPF tools in the Cloud Native Security Runtime Space, including Falco, Tracee, and Tetragon. Enhance your understanding of cutting-edge security challenges and solutions in the rapidly evolving landscape of cloud-native technologies.

Syllabus

Fileless Attack - Detecting the Undetectable - Carolina Valencia, Aqua Security


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Analyzing Postgres Performance Problems Using Perf and eBPF
Microsoft via YouTube
Citus Con - An Event for Postgres - Americas Livestream
Microsoft via YouTube
EBPF - The Next Power Tool of SREs
USENIX via YouTube
Kernel Tracing With EBPF
media.ccc.de via YouTube
Building Observability for 99% Developers
Docker via YouTube