Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CNCF [Cloud Native Computing Foundation]

How This Innocent Image Had a Party in My Cluster

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Explore the evolution of sophisticated container image attacks and learn effective defense strategies in this 34-minute conference talk by Amir Jerbi and Itay Shakury from Aqua Security. Discover how malicious actors employ advanced techniques to evade static analysis and signature-based detection. Gain insights into dynamic analysis methods for tracing container activity and uncovering multi-stage attacks. Examine real-world examples of evasion malware, including downloading executables, packing, fileless files, and supply chain attacks. Learn practical advice for developers and cluster administrators on detecting similar techniques and implementing security controls to mitigate risks. Understand the importance of runtime security and dynamic threat analysis in protecting your container environments.

Syllabus

Introduction
What is Container Image Scanning
Evasion Malware
Runtime Security
Demo Agenda
Downloading an executable
Packing
Fileless Files
Supply Chain Attacks
Dynamic Threat Analysis

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of How This Innocent Image Had a Party in My Cluster

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.