Anatomy of a Serverless Injection Attack - Step by Step

Logo
Presented by

Tal Melamed, Head of Security Research, Protego Labs

About this talk

The OWASP Serverless top 10 project has launched. The upcoming report will evaluate the Top 10 for serverless environments, explaining and demonstrating the differences in attack vectors, defense techniques, and business impact. Join us for this webinar to learn about what might be the biggest change...& the most concerning – injection attacks. Protego’s Head of Security Research will show you what a serverless injection attack really looks like using code regularly found in the wild. Key Takeaways: --See a Slack bot serverless injection attack in action --View serverless attacks from attacker’s & defender’s points of view --Learn about the goal of the ongoing OWASP Serverless top 10 project
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (348)
Subscribers (53142)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.