Fileless Attacks: The Scariest Exploits That Don’t Use Malware


Vincent Weafer (Chief Operations Officer and Head of Research, TriagingX)

Location: Grand Ballroom E

Date: Wednesday, May 2

Time: 1:00pm - 1:50pm

Pass Type: All Access, Conference

Format: Conference Session

Track: Security

Audience: Intermediate

Vault Recording: TBD

Audience Level: Intermediate

Why bother trying to sneak a malicious payload past a gauntlet of anti-malware and other detection tools if you don’t have to? In the same way a social engineer might manipulate a trusted insider for malicious purposes, attackers can manipulate trusted programs/processes for malicious purposes – and they’re doing so at increasing rates, during more stages of the attack kill chain.

In this session, learn about the increasing popularity of “fileless attacks” – including in-memory attacks, remote logins, and macro attacks – and see these exploits in action. Learn what factors make your organization more vulnerable to these threats, and learn how to detect and defend against threats that your anti-virus software cannot see.

Presentation File