Explore the evolution of sophisticated container image attacks and learn effective defense strategies in this 34-minute conference talk by Amir Jerbi and Itay Shakury from Aqua Security. Discover how malicious actors employ advanced techniques to evade static analysis and signature-based detection. Gain insights into dynamic analysis methods for tracing container activity and uncovering multi-stage attacks. Examine real-world examples of evasion malware, including downloading executables, packing, fileless files, and supply chain attacks. Learn practical advice for developers and cluster administrators on detecting similar techniques and implementing security controls to mitigate risks. Understand the importance of runtime security and dynamic threat analysis in protecting your container environments.