Главная
Study mode:
on
1
Introduction
2
What is Container Image Scanning
3
Evasion Malware
4
Runtime Security
5
Demo Agenda
6
Downloading an executable
7
Packing
8
Fileless Files
9
Supply Chain Attacks
10
Dynamic Threat Analysis
Description:
Explore the evolution of sophisticated container image attacks and learn effective defense strategies in this 34-minute conference talk by Amir Jerbi and Itay Shakury from Aqua Security. Discover how malicious actors employ advanced techniques to evade static analysis and signature-based detection. Gain insights into dynamic analysis methods for tracing container activity and uncovering multi-stage attacks. Examine real-world examples of evasion malware, including downloading executables, packing, fileless files, and supply chain attacks. Learn practical advice for developers and cluster administrators on detecting similar techniques and implementing security controls to mitigate risks. Understand the importance of runtime security and dynamic threat analysis in protecting your container environments.

How This Innocent Image Had a Party in My Cluster

CNCF [Cloud Native Computing Foundation]
Add to list