Oct 31, 2018
Memory-Based Attacks Are on the Rise: Josh Fu Tells Us How to Stop Them
You may have heard a lot lately about memory-based attacks, fileless attacks, and living-off-the-land attacks.
Attackers are increasingly using this type of attack because it works. It is less detectable by antivirus engines and even by some next-gen AV solutions. Because of this, the bad guys using this technique are more likely to succeed in their mission, which is to steal your stuff.
The pressing question is… what does that mean for you and your network? The bad news is that Memory-Based Attacks are on the rise. The good news is that Cylance knows how to stop them.
In this week’s episode of DirtySecurity, Edward Preston chats with Cylance engineer Josh Fu about fileless attacks. We’ll learn about what they are, why they are so prevalent, how they work and how to prevent them from hurting your network.
About Josh Fu
Josh Fu (@jfusecurity), CISM, CISSP, is a Security Engineer for Cylance. Josh has experience as a Channel Manager and consultant in cloud infrastructure and as a Sales Engineer in cybersecurity. Josh founded the West Coast chapter of the International Consortium of Minority Cybersecurity Professionalsand has presented in front of industry audiences across the country.
About Edward Preston
Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management.
Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center.
To hear more, visit:
ThreatVector InSecurity Podcasts:
iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2
GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste
Make sure you Subscribe, Rate and Review!