Trustwave Blog

What Does a Fileless Malware Attack Look Like?

Written by Dan Kaplan | Aug 15, 2017
 

Cybercriminals are hastening their use of methods and malware that are intended to evade detection. Trustwave Incident Response Consultant James Antonakos recounts his involvement in real-life breach investigations to describe how resource-deprived organizations can get started on addressing insidious, but subtle, attacks like fileless malware. One of their options, James explains, is through proactive threat hunting.