Supply chain, data theft, spyware, ransomware, and other malicious attacks against Linux servers have increased by over 35 percent in 2021, especially against legacy systems, applications, and distributions. Many of these attacks use remote, unauthorized, or weaponized code execution, living off the land (LotL) or man-in-the-middle (MitM) privilege escalation, polymorphic defense evasion, and other advanced tactics. This webinar examines how attackers are bypassing traditional security defenses to establish command and control (C&C), exfiltration, and malicious access to mission-critical information on Linux servers. An understanding of how these attacks are executed can help you improve security measures and create a strong defense-in-depth strategy to prevent significant financial impacts, lawsuits, and brand damage.
This webinar will cover:
* Why attackers are targeting Linux servers at a much higher rate with more sophisticated tactics and techniques
* How attackers are bypassing traditional security defenses to establish command and control (C&C), exfiltration, and malicious access
* How to create a strong defense-in-depth strategy to prevent significant financial impacts, lawsuits, and brand damage