Security News > 2017 > August > The anatomy of a completely fileless attack (Help Net Security)
The use of fileless malware is definitely on the rise, and it’s used both by targeted threat actors and cybercriminals. Trend Micro researchers, though, are keen to explain that there are malware that are fileless only while entering a user’s system (and they eventually reveal themselves when they execute their payload), and there are completely fileless malware attacks, where the entire infection chain is fileless. One example of the latter starts with a downloader Trojan … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/xBvM_ttXQhc/
Related news
- Critical Security Flaw in WhatsUp Gold Under Active Attack - Patch Now (source)
- 18-year-old security flaw in Firefox and Chrome exploited in attacks (source)
- Most Ransomware Attacks Occur When Security Staff Are Asleep, Study Finds (source)
- SQL Injection Attack on Airport Security (source)
- Security measures fail to keep up with rising email attacks (source)