Doki is the latest high profile attack actively infecting misconfigured Docker servers in AWS, Azure, and other cloud platforms. Anyone with publicly open Docker API access is at high risk to be hacked due to the attackers’ continuous internet-wide scanning for vulnerable victims.
The malware used in this attack is a fully undetected backdoor. It has managed to stay undetected for over six months despite being uploaded to VirusTotal several months ago.
In this webinar, understand how this attack is being conducted and ways to prevent Doki from infecting your containerized environments in the cloud.
You will learn:
1. How this attack is using a previously undocumented technique
2. Immediate action items required of container server owners
3. Understand why the industry is adopting Zero Trust Execution to secure cloud workloads
Kaiji is our researchers’ latest discovery, written from scratch using Go programming language to target IoT devices and Linux-based servers. Instead of relying on exploiting unpatched flaws, this botnet spreads exclusively through brute-force attacks against publicly accessible SSH servers.
Kaiji has been in the news recently infecting unsecured Docker servers to then carry out DDoS attacks. Docker servers, which are a type of containerized workload, are relatively convenient to deploy in the cloud, making them an increasingly popular choice for enterprises but also an attractive target for attackers.
In this webinar, we will present an analysis of the Kaiji malware and explain how to protect your containerized workloads against this botnet and other emerging Linux threats.
You will learn:
1. Why monitoring the runtime environment is the key to preventing most cyber attacks on your cloud infrastructure
2. How to protect your cloud workloads against Kaiji and other emerging threats
Itai Tevet, CEO of Intezer , Matt Hollcraft, CISO of Hellman & Friedman, Hussein Syed CISO of RWJBarnabas Health
The “Shift Left” movement has redefined the roles and responsibilities of security teams, software development teams and infrastructure teams.
Has this enormous change positively or negatively impacted security teams? Is it possible that we have shifted too far left?
Join experts Matt Hollcraft, CISO of Hellman & Friedman, Hussein Syed CISO of RWJBarnabas Health, and Itai Tevet, CEO of Intezer in this webinar which will explore the DevOps/security relationship, discuss the need for creating independence and review potential solutions for security teams.
The Linux operating system accounts for nearly 90 percent of all cloud servers. With companies increasingly storing their most sensitive information on the cloud, we expect that Linux threats will pose a significant risk to enterprise security in the near future. Attend this webinar to see how we apply code reuse analysis to the world of runtime Cloud Workload Protection and incident response
The use of application control (also known as whitelisting) is considered to be a robust and essential Cloud Workload Protection strategy largely due to the high predictability of cloud environments.
But it does not prevent all cyber attacks. Attackers can exploit vulnerabilities in trusted applications or utilize whitelisted apps for malicious intent—referred to as “Living off the Land.” App control also presents some operational headaches, requiring strict and often unrealistic policies.
This webinar explains how to build a robust application control strategy that is informed by these challenges. Learn what capabilities you should consider when evaluating a Cloud Workload Protection Platform (CWPP).
The Linux threat ecosystem is crowded with IoT DDoS botnets and crypto-mining malware. With low detection rates in nearly all leading antivirus solutions, Linux threats pose new challenges to the information security community that have not been observed in other operating systems.
The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.
Join IoT and security experts to learn more about:
- Unique challenges of securing IoT systems
- IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
- Proactive security strategies to stave off the threat of IoT cyber attacks
Ari Eitan, VP of Research, Intezer
Udi Solomon, CEO & Co-Founder, ShieldIoT
Moshe Shlisel, CEO and Co-Founder, GuardKnox
Guy Dagan, Cofounder and Partner, Consienta
Revealing the "genetic" origins of software, Intezer introduces a new way to detect and respond to cyber threats. Intezer offers enterprises an advanced solution to detect modern cyber attacks, with deep context for effective incident response. For more information, visit www.intezer.com or follow the company on Twitter at @IntezerLabs.