2 of 8
Protection gaps
A fileless attack avoids downloading malicious executable files by using exploits, macros, scripts or legitimate system tools instead. Rather than installing malicious files that antivirus software can scan and block, these attacks use exploits that run malicious code or launch scripts from memory, infecting endpoints without leaving evidence behind.

Only 36 percent of security pros say their organization has the resources to minimize fileless attacks, despite 69 percent reporting that endpoint security risks have significantly increased. Only three in 10 respondents believe traditional protections such as antivirus programs, which rely on file scanning and signature matching, provide protection to stop serious attacks from new and unknown threats.