memory based attacks

Results 1 - 4 of 4Sort Results By: Published Date | Title | Company Name
Published By: Carbon Black     Published Date: Apr 27, 2020
A fileless attack (“memory-based” or “living-off-the-land,” for example) is one in which an attacker uses existing software, allowed applications and authorized protocols to carry out malicious activities. More and more attackers are moving away from traditional malware—in fact, 60% of today’s attacks involve fileless techniques. These attacks are capable of gaining control of computers without using traditional executable files as a first level of attack. With fileless attacks, an attacker is able to infiltrate, take control and carry out objectives by taking advantage of vulnerable software that a typical end user would leverage on a dayto-day basis (think web browsers or Office-suite applications). Attackers will also use the successful exploit to gain access to native operating system tools (like PowerShell and Windows Management Instrumentation – WMI) or other applications that grant the attacker a level of execution freedom. These native tools grant users exceptional access and
Tags : 
    
Carbon Black
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
Lumension
Published By: Lumension     Published Date: Oct 20, 2014
Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
Lumension
Published By: Lumension     Published Date: Oct 20, 2014
Sit in on an expert panel discussion about the concerns of cyber security for businesses.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
Lumension
Search      

Add Research

Get your company's research in the hands of targeted business professionals.