Hunting for Ghosts in Fileless Attacks

May 18, 2019

Nowadays, modern fileless malware uses a mix of techniques to evade detection and to stay off the radar. Threat actors are turning to use this technique more often to carry out their attacks. This trend is simply because legacy solutions like traditional signature-based antivirus are struggling to keep up with its sophistication (Trend Micro, 2017). Attackers are always aiming for stealth, and the characteristic of fileless malware is just the perfect ingredient to blend into normal day-to-day operations of an organization and to stay undetected.

Spotlight

LINKBYNET

Founded in 2000 by Patrick and Stéphane Aisenberg, LINKBYNET aims to meet the needs and expectations of its Customers via IT managed services and hosting, along with tailor-made, adaptable, and hi-tech services. Via its management of 24/7 e-commerce sites, LINKBYNET has always been e-business market oriented. The warranty of all internet oriented applications availability is in the heart of our expertise.

OTHER WHITEPAPERS
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

The State of Zero Trust Security 2022

whitePaper | September 27, 2022

The philosophy of Zero Trust security—“never trust; always verify”—has certainly struck a chord. It took decades for organizations to move past the basic castle andmoat security mindset, and to accept that in a cloud world, there is no perimeter to defend, and intruders are always on our networks.

Read More
news image

Application Security in a Multi-Cloud World

whitePaper | October 18, 2022

In the mad dash to the cloud, organizations have turned their application environments into a miscellaneous mess. Whether it be private, public or on-premise, organizations are leveraging heterogenous application hosting environments as they transition to the next phase of cloud computing: The multi-cloud.

Read More
news image

How MX Protects Your Data

whitePaper | December 22, 2022

MX’s approach to security includes a defense-in-depth strategy. This strategy is supported by an established, operational MX Security Program, with a robust suite of governing policies, processes, security controls, and procedures to achieve MX’s security strategy. MX enacts defense in depth by hardening each layer of MX’s infrastructure and supporting processes.

Read More
news image

C2 Identity Security White Paper

whitePaper | December 20, 2022

Organizations are adopting distributed and complex network security due to the changing organizational structure trend. C2 Identity is essential to any business to improve convenience and flexibility in managing identity information and access privileges while protecting corporate resources from unauthorized access, both within and outside the organization's boundaries.

Read More

Spotlight

LINKBYNET

Founded in 2000 by Patrick and Stéphane Aisenberg, LINKBYNET aims to meet the needs and expectations of its Customers via IT managed services and hosting, along with tailor-made, adaptable, and hi-tech services. Via its management of 24/7 e-commerce sites, LINKBYNET has always been e-business market oriented. The warranty of all internet oriented applications availability is in the heart of our expertise.

Events