Hi [[ session.user.profile.firstName ]]

Linux Threat Landscape

The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. With low detection rates in nearly all leading antivirus solutions, Linux threats pose new challenges to the information security community that have not been observed in other operating systems.
Recorded May 29 2020 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Shaul Holtzman, Nacho Sanmillan
Presentation preview: Linux Threat Landscape

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Protecting Containerized Workloads against Kaiji and Emerging Threats Jul 20 2020 3:00 pm UTC 30 mins
    Paul Litvak, Shaul Holtzman
    Kaiji is one of our researchers’ latest discoveries, written entirely from scratch using Go programming language to target IoT devices and Linux-based servers. Instead of relying on exploiting unpatched flaws, the botnet spreads exclusively through brute-force attacks against publicly accessible SSH servers.

    Kaiji has been in the news recently infecting unsecured Docker servers to then carry out DDoS attacks. Docker servers, which are a type of containerized workload, are relatively convenient to deploy in the cloud, making them an increasingly popular choice for enterprises but also an attractive target for attackers.

    In this webinar, we will present an analysis of the Kaiji malware and explain how to protect your containerized workloads against this botnet and other emerging Linux threats.

    You will learn:
    Why monitoring the runtime environment is the key to preventing most cyber attacks on your cloud infrastructure
    How to protect your cloud workloads against Kaiji and other emerging threats
  • DevOps and Security -Have We Shifted Too Far Left ? Recorded: Jun 30 2020 53 mins
    tai Tevet, CEO of Intezer , Matt Hollcraft, CISO of Hellman & Friedman, Hussein Syed CISO of RWJBarnabas Health
    The “Shift Left” movement has redefined the roles and responsibilities of security teams, software development teams and infrastructure teams.

    Has this enormous change positively or negatively impacted security teams? Is it possible that we have shifted too far left?

    Join experts Matt Hollcraft, CISO of Hellman & Friedman, Hussein Syed CISO of RWJBarnabas Health, and Itai Tevet, CEO of Intezer in this webinar which will explore the DevOps/security relationship, discuss the need for creating independence and review potential solutions for security teams.
  • Genetic Analysis vs. Fully Undetected Linux Threat Recorded: Jun 25 2020 54 mins
    Paul Litvak, Shaul Holtzman
    The Linux operating system accounts for nearly 90 percent of all cloud servers. With companies increasingly storing their most sensitive information on the cloud, we expect that Linux threats will pose a significant risk to enterprise security in the near future. Attend this webinar to see how we apply code reuse analysis to the world of runtime Cloud Workload Protection and incident response
  • Build a Robust App Control Strategy for your Cloud Workloads Recorded: Jun 2 2020 58 mins
    Itai Tevet, CEO at Intezer
    The use of application control (also known as whitelisting) is considered to be a robust and essential Cloud Workload Protection strategy largely due to the high predictability of cloud environments.

    But it does not prevent all cyber attacks. Attackers can exploit vulnerabilities in trusted applications or utilize whitelisted apps for malicious intent—referred to as “Living off the Land.” App control also presents some operational headaches, requiring strict and often unrealistic policies.

    This webinar explains how to build a robust application control strategy that is informed by these challenges. Learn what capabilities you should consider when evaluating a Cloud Workload Protection Platform (CWPP).
  • Cyber Threat Spotlight Linux APTs Recorded: May 29 2020 9 mins
    Paul Litvak
    Malware analyst Paul Litvak discusses APTs targeting the Linux ecosystem and offers mitigation recommendations
  • Linux Threat Landscape Recorded: May 29 2020 60 mins
    Shaul Holtzman, Nacho Sanmillan
    The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. With low detection rates in nearly all leading antivirus solutions, Linux threats pose new challenges to the information security community that have not been observed in other operating systems.
  • IoT Cyber Attacks and Proactive Security Recorded: Jan 29 2019 56 mins
    Moshe Shlisel, Udi Solomon, Ari Eitan, Guy Dagan
    The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.

    Join IoT and security experts to learn more about:
    - Unique challenges of securing IoT systems
    - IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
    - Proactive security strategies to stave off the threat of IoT cyber attacks

    Panellists
    Ari Eitan, VP of Research, Intezer
    Udi Solomon, CEO & Co-Founder, ShieldIoT
    Moshe Shlisel, CEO and Co-Founder, GuardKnox
    Guy Dagan, Cofounder and Partner, Consienta
Defend your cloud servers in runtime
Revealing the "genetic" origins of software, Intezer introduces a new way to detect and respond to cyber threats. Intezer offers enterprises an advanced solution to detect modern cyber attacks, with deep context for effective incident response. For more information, visit www.intezer.com or follow the company on Twitter at @IntezerLabs.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Linux Threat Landscape
  • Live at: May 29 2020 6:45 pm
  • Presented by: Shaul Holtzman, Nacho Sanmillan
  • From:
Your email has been sent.
or close