Anatomy of a Serverless Injection Attack - Step by Step

Logo
Presented by

Tal Melamed, Head of Security Research, Protego Labs

About this talk

The OWASP Serverless top 10 project has launched. The upcoming report will evaluate the Top 10 for serverless environments, explaining and demonstrating the differences in attack vectors, defense techniques, and business impact. Join us for this webinar to learn about what might be the biggest change...& the most concerning – injection attacks. Protego’s Head of Security Research will show you what a serverless injection attack really looks like using code regularly found in the wild. Key Takeaways: --See a Slack bot serverless injection attack in action --View serverless attacks from attacker’s & defender’s points of view --Learn about the goal of the ongoing OWASP Serverless top 10 project

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (247)
Subscribers (40471)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.