InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Open-Source Malware: An Evolving Landscape & Technical Analysis

Presented by

Hido Cohen, Cyber Security Researcher and Michael Gorelik, CTO

About this talk

Morphisec Threat Labs researchers have seen an uptick in attack campaigns using open-source malware. As software development open-source communities grow, so does the malware community, offering free and publicly available malicious tools. Our Threat Labs researchers have analyzed data from nearly nine million endpoints to provide an in-depth analysis of the current state of open-source malware. This webinar will cover the different open-source malware we see in the wild, how attackers use it, and ways to protect against these attacks. Our researchers also show real-world open-source malware delivery examples from APT groups (advanced persistent threat) and seasonal attackers. Watch to learn: * The current state of open-source malware and attacks * Several categories of open-source malware * Different delivery techniques for open-source malware * Real-world examples from APT groups and seasonal hackers * Advice for an effective prevention strategy
Morphisec

Morphisec

2043 subscribers30 talks
Stop Undetectable Attacks
Morphisec offers prevention-first cybersecurity from endpoint to the cloud. Morphisec provides real-time risk visibility and secures device memory at runtime to stop the most damaging, undetectable attacks. This includes ransomware, supply chain attacks, fileless attacks, zero-days, and other advanced, stealthy, evasive attacks. Morphisec's Automated Moving Target Defense (AMTD) technology provides a lightweight, Defense-in-Depth security layer to augment solutions like NGAV, EPP, and EDR/XDR and close their runtime memory security gap against undetectable cyberattacks.
Related topics