This resource is no longer available
Reflective Memory Attacks Deep Dive: How They Work; Why They're Hard to Detect
Reflective memory attacks are when an attacker is able to load large programs and execute them inside an already running process using its memory, resources, and authority. As if that wasn’t bad enough, these attacks also bypass most common security technologies, meaning that to protect your system against them, you have to be on your best game. This crucial webcast takes an in-depth look at reflective memory attacks, analyzing how they work, why they’re so critical a threat, and what your organization can do mitigate these kinds of attacks.