Hi [[ session.user.profile.firstName ]]

Get Deep and Dirty on Fileless Attacks and How to Avoid Them

Join us for a technical deep dive on:
- What is a Fileless Attack and why is it so dirty?
- How exploits circumvent common countermeasures
- DEMO 1: NGINX Attack – see an exploit circumvent all the common countermeasures
- Polymorphing for Linux and Open Source
- DEMO 2: SSH Attack: exploiting a buffer overflow – watch a live attack without Polymorphing, then with Polymorphing.
- Deep dive on Polymorphing and the underlying technology
- DEMO 3: See a live Boothole vulnerability attack then we’ll disassemble and analyze a Polymorphed program
Recorded Oct 14 2020 76 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rui Maximo, Director of Solutions Engineering & Archis Gore, CTO
Presentation preview: Get Deep and Dirty on Fileless Attacks and How to Avoid Them

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
Stop attacks before they start
Polyverse develops leading-edge cybersecurity technology which protects Linux systems against all memory-based exploits by stopping attacks, before they start. Polyverse technology is widely deployed by government and enterprises both on-premise and in the cloud as well as embedded into edge devices and end point solutions to provide the ultimate protection against hackers.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Get Deep and Dirty on Fileless Attacks and How to Avoid Them
  • Live at: Oct 14 2020 7:00 pm
  • Presented by: Rui Maximo, Director of Solutions Engineering & Archis Gore, CTO
  • From:
Your email has been sent.
or close