Malware-free and fileless malware attacks are on the rise. Recent Cybereason research shows that almost a quarter of organizations worldwide were victims of fileless malware attacks in the past year.
Amit Serper, principal security researcher at Cybereason and Matt Bromiley, SANS Analyst, will explain the various mechanisms used by attackers and review effective approaches for detection and response.
In this webcast, you will learn:
- Learn about fileless malware techniques, such as PowerShell and Windows Management Instrumentation (WMI)
- Find out why these attacks are hard to detect and mitigate
- Learn how Cybereason detects and responds to such attacks
Amit Serper is the go-to person when out of the box thinking is needed to find vulnerabilities in complex infrastructure. Amit can spot the inherent vulnerabilities in embedded systems and is renowned for his shell popping abilities. He’s popped various embedded devices such as routers, IP cameras, even home irrigation systems. At Cybereason, Amit leads research on novel methodologies for identifying complex hacking operations that tend to evade common detection tools. Specifically, he researches large corporate networks, building methods to identify the attacker’s lateral movement from initially penetrating a single endpoint to spreading broadly to taking total control of the attacked.
Matt Bromiley, a SANS GIAC Advisory Board member who holds the GCFA and GNFA certifications, is an up-and-coming forensics instructor. A senior consultant at a major incident response and forensic analysis company, he has experience in digital forensics, incident response/triage and log analytics. His skills include disk, database and network forensics, as well as memory analysis and network security monitoring. Matt has worked with clients of all types and sizes, from multinational conglomerates to small, regional shops. He is passionate about learning, sharing with others and working on open source tools.