Our top picks for industry articles include a detailed explanation of fileless malware by the folks at Trend Micro. A great reference for those collecting threat data is the piece on Windows file types used by malware. And just in case you missed it, one source gives details about the record-setting DDoS attack witnessed by Imperva.
For more articles, check out our #onpatrol4malware blog.

The Fileless , Non-Malware Menace
Source: Trend Micro
Fileless malware threats have been around for years, though lately, such threats are on the rise precisely because fileless attacks are more stealthy and subtle than malware executables dropped on your disk, which can be more readily caught by traditional antivirus software. Read more.

Info-Stealer FormBook continues activity using a new file hosting service
Source: deepinstinct
As part of the recent wave of attacks, Deep Instinct prevented Formbook attacks targeting customers in the retail and hospitality sectors in North-America. Read more.

Massive DDoS Attack Generates 500 Million Packets per Second
Source: DarkReading
Earlier this month, Imperva mitigated an attack against one of its clients that exceeded 500 million packets per second, making it possibly the largest DDoS attack by packet volume ever recorded. Read more.

Windows File Types Used by Malware
Source: Sensors Tech Forum
There are a lot of file types that serve different functions and with the proper coding skills or scripts available, they can be turned into obfuscated cyber-weapon to serve their masters’ purpose. Read more.

Attackers Are Leveraging Automation
Source: Radware
Cybercriminals are weaponizing automation and machine learning to create increasingly evasive attack vectors, and the internet of things (IoT) has proven to be the catalyst driving this trend. Read more.

BEC Actors Exploiting Gmail “Dot Accounts” for Fun and Profit
Source: Agari
Recently, during one of our investigations into a group comprised of these threat actors, we observed several scammers taking advantage of a “feature” that Google has built into Gmail addresses. Read more.

CoAP Attacks in the Wild
Source: Netscout
Attackers have recently begun launching CoAP reflection/amplification DDoS attacks, a protocol primarily used today by mobile phones in China, but expected to grow with the explosion of Internet of Things (IoT) devices. Read more.