The Memory Attack Battleground

Logo
Presented by

Satya Gupta, CTO, Willy Leichter, VP, Virsec

About this talk

The multitude of recent cyberattacks have a number of things in common: they are sophisticated, multi-pronged, use fileless techniques, and target applications at in process memory – largely invisible to conventional security products. Attacks including WannaCry, Petya, NotPetya, SystemD, Industroyer, and Apache Struts all leveraged memory-based attacks to infiltrate, pivot, and hijack valuable data. What used to be viewed as arcane, theoretical attacks have now become easily accessible through the Shadow Brokers leak of advanced memory corruption tool kits. Learn from Virsec experts: •Why memory attacks are under the radar of most security •How to map correct memory usage and detect deviations •New models for protecting applications from the inside

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (95)
Subscribers (4309)
Virsec is the industry leader of application-aware server workload protection. Learn how to improve and optimize your security posture, ensure real-time protection from today's most dangerous cyber threats and attacks, including memory corruption, fileless and zero-day attacks. Hear valuable insights from cybersecurity leaders, experts and influencers, vulnerability analysis and more.