Fileless Attack - Detecting the Undetectable
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore the intricacies of fileless attacks and their detection in this informative conference talk. Delve into the world of advanced cybersecurity threats as Carolina Valencia from Aqua Security breaks down the concept of fileless attacks, their growing prevalence in Linux and container environments, and effective detection methods. Learn how these stealthy attacks operate by loading malware directly into memory, evading common defenses and static scanning. Discover the use of compression and encryption techniques employed by attackers to cloak malicious files. Through a practical demonstration, gain insights into creating a fileless attack and detecting unexpected activity using eBPF tools in the Cloud Native Security Runtime Space, including Falco, Tracee, and Tetragon. Enhance your understanding of cutting-edge security challenges and solutions in the rapidly evolving landscape of cloud-native technologies.
Syllabus
Fileless Attack - Detecting the Undetectable - Carolina Valencia, Aqua Security
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Introducción al Análisis del Malware en WindowsNational Technological University – Buenos Aires Regional Faculty via Miríadax The Complete Cyber Security Course : End Point Protection!
Udemy Máster en Seguridad Informática. Curso completo de Hacking.
Udemy Network Analysis with Arkime
Pluralsight Configuring Firepower Threat Defense (FTD) Integrations
Pluralsight