Fileless, evasive malware is shaping up to be the exploit of the future, at least until something more potent and insidious comes along. Businesses must move quickly to supplement their endpoint protection solutions that depend on previously identified patterns and signatures.
Read full news article on Infosec Island