Hunting for Ghosts in Fileless Attacks

May 18, 2019

Nowadays, modern fileless malware uses a mix of techniques to evade detection and to stay off the radar. Threat actors are turning to use this technique more often to carry out their attacks. This trend is simply because legacy solutions like traditional signature-based antivirus are struggling to keep up with its sophistication (Trend Micro, 2017). Attackers are always aiming for stealth, and the characteristic of fileless malware is just the perfect ingredient to blend into normal day-to-day operations of an organization and to stay undetected.

Spotlight

BluePex Security Solutions

BluePex® came to solve the biggest demands in cybersecurity market, with solutions designed for SMEs all over the world. Our products are designed to provide an integrated and intelligent management of services such as firewall, antispam, backup cloud, data center monitor, control and protection of endpoints + servers and more.

OTHER WHITEPAPERS
news image

Cybersecurity and Financial SystemResilience Report

whitePaper | July 27, 2022

The Consolidated Appropriations Act, 20211 (CAA) requires the Federal Reserve Board (Board) to submit annually for seven years a report focused on cybersecurity to Congress. The CAA calls for a description of measures the Board has undertaken to strengthen cybersecurity within the financial services sector and with respect to the Board’s functions as a regulator, including the supervision and regulation of financial institutions and third-party service providers.

Read More
news image

VIRSEC ® SECURITY PLATFORM

whitePaper | December 10, 2019

Advanced application attacks that weaponize at runtime (WRT) are increasingly putting businesses at risk. These attacks challenge application security by leveraging fileless malware, memory corruption and uncommon vulnerabilities to evade traditional security solutions. WRTs manipulate legitimate processes and enable stealthy execution of malicious code, resulting in data breaches, damaged infrastructure, and financial losses.

Read More
news image

The Definitive WFH Security Checklist: 10 Easy Steps to Safer Remote Access

whitePaper | September 15, 2022

Providing secure, fast remote access is a top priority as the modern workforce has become predominantly remote. Working from home (WFH) or outside the office was once a choice or a stopgap measure, but today, it’s critical for business agility.

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Security, privacy, and compliance with Illumina Connected Analytics

whitePaper | August 23, 2022

Advances in next-generation sequencing (NGS) technologies have dramatically increased the amount of data generated, creating challenges in data analysis and interpretation. Illumina Connected Analytics (ICA) is a secure genomic data platform to operationalize informatics and drive scientific insights. ICA provides an extensible platform with a rich set of RESTful application program interfaces (APIs) and a command-line interface (CLI) tool to maximize workflow efficiency.

Read More
news image

Aerospace cybersecuirty- Bringing a zero-trust approach to aviation product network design

whitePaper | May 18, 2022

Modern aerospace products are moving into containerization and micro-services. Mounting connected internal micro-services patterns in a product segregates and segments the network to support a zero-trust network security approach. Having weak internal network security of the product allows malicious actors to exploit them and elevate privileges — denying users access, jamming signals, or even shutting them down. Such interference could cause major harm to aircraft safety and operations.

Read More

Spotlight

BluePex Security Solutions

BluePex® came to solve the biggest demands in cybersecurity market, with solutions designed for SMEs all over the world. Our products are designed to provide an integrated and intelligent management of services such as firewall, antispam, backup cloud, data center monitor, control and protection of endpoints + servers and more.

Events