Linux: How to Defend the New Cyberattack Frontier

Logo
Presented by

Nir Givol, Senior Product Manager at Morphisec; Bill Reed, Director of Product Marketing at Morphisec

About this talk

Supply chain, data theft, spyware, ransomware, and other malicious attacks against Linux servers have increased by over 35 percent in 2021, especially against legacy systems, applications, and distributions. Many of these attacks use remote, unauthorized, or weaponized code execution, living off the land (LotL) or man-in-the-middle (MitM) privilege escalation, polymorphic defense evasion, and other advanced tactics. This webinar examines how attackers are bypassing traditional security defenses to establish command and control (C&C), exfiltration, and malicious access to mission-critical information on Linux servers. An understanding of how these attacks are executed can help you improve security measures and create a strong defense-in-depth strategy to prevent significant financial impacts, lawsuits, and brand damage. This webinar will cover: * Why attackers are targeting Linux servers at a much higher rate with more sophisticated tactics and techniques * How attackers are bypassing traditional security defenses to establish command and control (C&C), exfiltration, and malicious access * How to create a strong defense-in-depth strategy to prevent significant financial impacts, lawsuits, and brand damage
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (40)
Subscribers (1979)
Morphisec offers prevention-first cybersecurity from endpoint to the cloud. Morphisec provides real-time risk visibility and secures device memory at runtime to stop the most damaging, undetectable attacks. This includes ransomware, supply chain attacks, fileless attacks, zero-days, and other advanced, stealthy, evasive attacks. Morphisec's Automated Moving Target Defense (AMTD) technology provides a lightweight, Defense-in-Depth security layer to augment solutions like NGAV, EPP, and EDR/XDR and close their runtime memory security gap against undetectable cyberattacks.