Fileless Attacks: The Scariest Exploits That Don’t Use Malware
Vincent Weafer (Senior Vice President, Intel Security)
Date: Wednesday, May 2
Time: 1:00pm - 1:50pm
Pass Type: All Access, Conference
Format: Conference Session
Vault Recording: TBD
Audience Level: Intermediate
Why bother trying to sneak a malicious payload past a gauntlet of anti-malware and other detection tools if you don’t have to? In the same way a social engineer might manipulate a trusted insider for malicious purposes, attackers can manipulate trusted programs/processes for malicious purposes – and they’re doing so at increasing rates, during more stages of the attack kill chain.
In this session, learn about the increasing popularity of “fileless attacks” – including in-memory attacks, remote logins, and macro attacks – and see these exploits in action. Learn what factors make your organization more vulnerable to these threats, and learn how to detect and defend against threats that your anti-virus software cannot see.