Sponsor of the Day:
Jerkmate
https://threatpost.com/encrypted-fileless-malware-growth/175306/
Encrypted & Fileless Malware Sees Big Growth | Threatpost
Oct 4, 2021 - An analysis of second-quarter malware trends shows that threats are becoming stealthier.
fileless malwaresees bigencryptedgrowththreatpost
https://thehackernews.com/2017/03/powershell-dns-malware.html
New Fileless Malware Uses DNS Queries To Receive PowerShell Commands
Cisco security researchers have discovered a new fileless malware that uses DNS Queries to receive PowerShell Commands from cyber criminals
fileless malwaredns queriespowershell commandsnewuses
https://thehackernews.com/2025/09/chinese-apt-deploys-eggstreme-fileless.html
Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems
EggStreme malware targets Philippines military with fileless multi-stage attacks, enabling persistent espionage and data theft.
chinese aptfileless malwaremilitary systemsdeploysbreach
https://gbhackers.com/purerat-hides-pe-payloads/
PureRAT Hides PE Payloads in PNGs for Fileless Execution
Apr 21, 2026 - A multi-stage PureRAT campaign that hides portable executable (PE) payloads inside PNG images and executes them almost entirely in memory.
hidespepayloadspngsfileless
https://www.avast.com/c-fileless-malware
Fileless Malware Explained | Detection, Types, & Prevention Tips
Fileless malware runs entirely in your RAM, leaving no trace on a hard disk. Learn the warning signs and how to keep your data safe.
fileless malwaretypes preventionexplaineddetectiontips
https://www.bitdefender.com/en-us/business/gravityzone-platform/fileless-attack-defense
Fileless Attack Defense - Bitdefender GravityZone
Apr 22, 2026 - Fileless Attack Defense module uses HyperDetect ML tunable technology to eliminate fileless malware by operating on a zero-trust basis at pre-execution.
attack defensebitdefender gravityzonefileless
https://www.csoonline.com/article/4074585/zero-disco-campaign-hits-legacy-cisco-switches-with-fileless-rootkit-payloads.html
‘Zero Disco’ campaign hits legacy Cisco switches with fileless rootkit payloads | CSO Online
Oct 18, 2025 - Researchers warn of fileless payloads, memory hooks, and a UDP-based C2 controller that complicate detection and remediation.
cso onlinecampaignhitslegacycisco
https://vercara.digicert.com/resources/what-is-fileless-malware-a-guide-for-businesses
What Is Fileless Malware? A Guide for Businesses
Learn how fileless malware operates in memory to evade detection, the threats it poses to businesses, and key strategies to detect and prevent these attacks.
fileless malwareguidebusinesses