Fileless malware: part deux

In part one of this series, we focused on an introduction to the concepts fileless malware, providing examples of the problems that we in the security industry face when dealing with these types of attacks.  In part two, I will be walking through a few demonstrations of fileless malware attacks that I have created. These labs demonstrate the problems we face when trying to detect fileless malware. I will first start off with a demonstration of malware that is detected strictly with static signatures.

Read full news article on Malwarebytes Unpacked

 


Date:

Categorie(s):