Blog

Recent
Cloud Security

No Files, No Trace? Think Again: Detecting Fileless Execution Attacks in the Cloud

Traditional security tools focus on scanning files written to disks, but what happens when no file ever lands there? Fileless attacks bypass static analysis and disk-based detection by executing directly in memory, often through existing tools like Bash, Python, or PowerShell. Although the Linux system call has benefits for software development, especially in the cloud, including use in sandbox frameworks, containerized applications, and temporary computations, those benefits are manipulated by threat actors to carry out attacks.
Miki Farber
May 19
6
min

Browse by Tag

All posts

What's new