Explore the evolution of cryptojacking techniques in cloud-native environments and learn effective strategies to protect against these threats in this informative conference talk. Delve into the world of cryptomining and its malicious counterpart, cryptojacking, as the speaker examines how attackers have shifted their focus from unpatched servers and browsers to cloud-native platforms, including containers, Kubernetes, CI/CD, and SCM systems. Gain insights into key concepts, attack techniques, and exploits used by threat actors, as well as the challenges they face and overcome to maximize their gains and conceal their activities. Discover proactive protection measures using open-source tools and approaches, ranging from static analysis to runtime protection, to strengthen your cloud-native security posture and mitigate the risks associated with cryptojacking attacks.
From Illuminating to Eliminating Crypto Jacking Techniques in Cloud Native
CNCF [Cloud Native Computing Foundation] via YouTube
Overview
Syllabus
From Illuminating to Eliminating Crypto Jacking Techniques in Cloud Native - Mor Weinberger
Taught by
CNCF [Cloud Native Computing Foundation]