Fighting Fileless Malware, Part 2: Countermeasures

Why do fileless attacks persist? Let’s break down the strengths and weaknesses of the existing mitigations. Even though the term “fileless malware” was only coined recently, fileless attacks have been around for more than three decades. You may have heard of the more well-known names, like buffer-overflow, stack-overflow and heap-overflow attacks.

Link: Fighting Fileless Malware, Part 2: Countermeasures
via http://www.darkreading.com

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s