Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolution of cryptojacking techniques in cloud-native environments and learn effective strategies to protect against these threats in this informative conference talk. Delve into the world of cryptomining and its malicious counterpart, cryptojacking, as the speaker examines how attackers have shifted their focus from unpatched servers and browsers to cloud-native platforms, including containers, Kubernetes, CI/CD, and SCM systems. Gain insights into key concepts, attack techniques, and exploits used by threat actors, as well as the challenges they face and overcome to maximize their gains and conceal their activities. Discover proactive protection measures using open-source tools and approaches, ranging from static analysis to runtime protection, to strengthen your cloud-native security posture and mitigate the risks associated with cryptojacking attacks.