Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]

Blog Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]

July 19, 2018 Category: Threats By: Jessica Morales Comments: 0

Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]

  • In this Dark Reading webinar, experts in cybersecurity share their views on what’s going on with malware, and how it evolves to outsmart even your most elaborate defenses
  • Hear about the growing proliferation of “fileless malware” — malware that uses trusted programs in sinister ways, instead of delivering the usual malicious payloads — and find out why it is so hard to detect it
  • Get tips and recommendations on how to improve your IT security processes by using the right tools to protect your organization against even the most cunning malware and crypto mining invasions

After decades of trying to detect and destroy malware, three things are clear:

  1. No matter how well we build software, there will always be vulnerabilities … and attackers will find ways to exploit them.
  2. Malicious code and threats will always exist. No matter how hard we try to thwart the efforts of hackers and cyber terrorists, they will continue to invent new ways to circumvent even the most advanced defenses.
  3. You cannot anticipate the attackers’ next move. Despite your vigilance and ongoing efforts to keep up with the latest patches and security upgrades, you will always be vulnerable to attacks that you haven’t seen before and therefore cannot detect.

Malware has come a long way since the early days of computer viruses. Most malware now has polymorphic capabilities, making it nearly impossible to recognize and detect.

Attackers are becoming more creative, often delaying the attack to map your organization’s computer network to figure out how to inflict the maximum amount of damage:

  • Viruses are designed to hold your computers captive for a ransom,
  • Cyber-thieves are using Trojans to gain access to your sensitive information, and
  • Cyber criminals are now trying to hijack your users’ systems to mine crypto currency, causing damage to both your data and your physical machines.

Against this ever-changing threatscape, even the most advanced multi-layered defense strategies that protect the cloud, the network, and the host, are quickly providing insufficient.

In this on-demand webinar hosted by Dark Reading security experts discuss:

  • How to identify attackers who are manipulating legitimate programs like Powershell and Windows Management Instrumentation tools to get passed your detection tools
  • Why cryptominers are a genuine enterprise IT threat and how to prevent them from being a drag on your performance
  • How you can add an effective last line of defense to your security stack to catch malware that bypasses other layers and prevent it from inflicting damage and spreading to other hosts

The panel of experts includes: Michael Rosen, Senior Product Marketing Manager at Bromium, Andrew Brandt, Principal Researcher at SophosLabs, and Sara Peters, Senior Editor at Dark Reading.

Don’t miss this chance to learn how you can protect your intellectual property and customer data by stopping even the most sophisticated threats.

 

Curious how Bromium stops malware and fileless malware? Learn more or request a demo.

Subscribe

Enter your email address to receive notifications.

About the Author

Jessica Morales

Jessica Morales

Recent Posts

Categories
2018-07-20T17:47:52+00:00 July 19th, 2018|Threats|

Leave a Reply

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.
Share
Tweet
Share

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close