Blogs & Stories

Trustwave Blog

The Trustwave Blog empowers information security professionals to achieve new heights through expert insight that addresses hot topics, trends and challenges and defines best practices.

What Does a Fileless Malware Attack Look Like?

Cybercriminals are hastening their use of methods and malware that are intended to evade detection. In the video above, Trustwave Incident Response Consultant James Antonakos recounts his involvement in real-life breach investigations to describe how resource-deprived organizations can get started on addressing insidious, but subtle, attacks like fileless malware. One of their options, James explains, is through proactive threat hunting.