Get a Pentest and security assessment of your IT network.

Cyber Security

A closer look at fileless malware beyond the network

Traditional malware contains the bulk of its malicious code within an executable file saved to the victim’s storage drive. Fileless malware only uses the initial ‘dropper’ file (usually an Office document or something similar) to open up a built-in system management tool like PowerShell and run a short script. The most common method (by far) is enabling and then using the xp_cmdshell procedure. WatchGuard Threat Lab recently identified an ongoing infection that used the latter technique.

Source: https://www.helpnetsecurity.com/2021/01/04/fileless-malware/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security