A fileless attack (“memory-based” or “living-off-the-land,” for example) is one in which an attacker uses existing software and authorized applications and protocols to carry out malicious activities. More and more attackers are moving away from traditional malware. In fact, 60% of today’s attacks involve fileless techniques that can gain control of computers without using traditional executable files.
Get the “Fileless Attacks” edition of the Carbon Black Threats on the Rise eBook series to build your understanding the threat, what it looks like in your environment and how to combat it.