Our top picks for industry articles include a detailed explanation of fileless malware by the folks at Trend Micro. A great reference for those collecting threat data is the piece on Windows file types used by malware. And just in case you missed it, one source gives details about the record-setting DDoS attack witnessed by Imperva.

For more articles, check out our #onpatrol4malware blog.

fileless malware

The Fileless , Non-Malware Menace

Source: Trend Micro

Fileless malware threats have been around for years, though lately, such threats are on the rise precisely because fileless attacks are more stealthy and subtle than malware executables dropped on your disk, which can be more readily caught by traditional antivirus software. Read more.

fileless malware

Info-Stealer FormBook continues activity using a new file hosting service

Source: deepinstinct

As part of the recent wave of attacks, Deep Instinct prevented Formbook attacks targeting customers in the retail and hospitality sectors in North-America. Read more.

fileless malware

Massive DDoS Attack Generates 500 Million Packets per Second

Source: DarkReading

Earlier this month, Imperva mitigated an attack against one of its clients that exceeded 500 million packets per second, making it possibly the largest DDoS attack by packet volume ever recorded. Read more.

fileless malware

Windows File Types Used by Malware

Source: Sensors Tech Forum

There are a lot of file types that serve different functions and with the proper coding skills or scripts available, they can be turned into obfuscated cyber-weapon to serve their masters’ purpose. Read more.

fileless malware

Attackers Are Leveraging Automation

Source: Radware

Cybercriminals are weaponizing automation and machine learning to create increasingly evasive attack vectors, and the internet of things (IoT) has proven to be the catalyst driving this trend. Read more.

fileless malware

BEC Actors Exploiting Gmail “Dot Accounts” for Fun and Profit

Source: Agari

Recently, during one of our investigations into a group comprised of these threat actors, we observed several scammers taking advantage of a “feature” that Google has built into Gmail addresses. Read more.

fileless malware

CoAP Attacks in the Wild

Source: Netscout

Attackers have recently begun launching CoAP reflection/amplification DDoS attacks, a protocol primarily used today by mobile phones in China, but expected to grow with the explosion of Internet of Things (IoT) devices. Read more.