Robuta

https://www.bitdefender.com/en-us/business/gravityzone-platform/fileless-attack-defense
Fileless Attack Defense module uses HyperDetect ML tunable technology to eliminate fileless malware by operating on a zero-trust basis at pre-execution.
bitdefender gravityzonefilelessattackdefense
https://hackread.com/fileless-wannamine-cryptojacking-malware-using-nsa-exploit/
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
filelesscryptojackingmalwareusingnsa
https://www.malwarebytes.com/blog/news/2016/03/fileless-infections-an-overview
Sep 26, 2023 - To date, there are a number of so-called fileless infections. By fileless infections or fileless malware, we are referring to an...
malwarebytes labsfilelessinfectionsoverview
https://www.csoonline.com/article/4074585/zero-disco-campaign-hits-legacy-cisco-switches-with-fileless-rootkit-payloads.html
Oct 18, 2025 - Researchers warn of fileless payloads, memory hooks, and a UDP-based C2 controller that complicate detection and remediation.
campaignhitslegacyciscoswitches
https://www.csoonline.com/article/4131340/phishing-campaign-chains-old-office-flaw-with-fileless-xworm-rat-to-evade-detection.html
Feb 12, 2026 - The campaign exploits an Office vulnerability to deliver the modular XWorm RAT, chaining HTA, PowerShell, and in-memory .NET execution to sidestep detection...
phishing campaignchainsoldofficeflaw
https://avlab.pl/en/edr-xdr-solutions-overview-2024-2nd-edition/
Jun 26, 2024 - We conducted an analysis of the EDR and XDR modules to justify the investment in a given product designed to protect systems against cyberattacks.
simulationoffensivefilelessattackstaking
https://www.avast.com/c-fileless-malware
Fileless malware runs entirely in your RAM, leaving no trace on a hard disk. Learn the warning signs and how to keep your data safe.
prevention tipsfilelessmalwareexplaineddetection