What Does a Fileless Malware Attack Look Like?

Cybercriminals are hastening their use of methods and malware that are intended to evade detection. In the video above, Trustwave Incident Response Consultant James Antonakos recounts his involvement in real-life breach investigations to describe how resource-deprived organizations can get started on addressing insidious, but subtle, attacks like fileless malware. One of their options, James explains, is through proactive threat hunting.

Trustwave reserves the right to review all comments in the discussion below. Please note that for security and other reasons, we may not approve comments containing links.