Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Fileless Attack - Detecting the Undetectable

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Explore the intricacies of fileless attacks and their detection in this informative conference talk. Delve into the world of advanced cybersecurity threats as Carolina Valencia from Aqua Security breaks down the concept of fileless attacks, their growing prevalence in Linux and container environments, and effective detection methods. Learn how these stealthy attacks operate by loading malware directly into memory, evading common defenses and static scanning. Discover the use of compression and encryption techniques employed by attackers to cloak malicious files. Through a practical demonstration, gain insights into creating a fileless attack and detecting unexpected activity using eBPF tools in the Cloud Native Security Runtime Space, including Falco, Tracee, and Tetragon. Enhance your understanding of cutting-edge security challenges and solutions in the rapidly evolving landscape of cloud-native technologies.

Syllabus

Fileless Attack - Detecting the Undetectable - Carolina Valencia, Aqua Security

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Fileless Attack - Detecting the Undetectable

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.