an emerging threat Fileless malware: a survey and research challenges
The article examined was written by Sushil Kumar Sudhakar and was titled ‘an emerging threat Fileless malware: a survey and research challenges.‘ The author examines how cybersecurity threats have evolved over time with the evolution of countermeasures. The new threat that cybersecurity faces is fileless malware. The unique thing about fileless malware is the lack of executables which foster to carry-out the activities of the threats, and it does not utilize file system (Sudhakar, 2020). Due to the lack of file systems, contemporary detection systems that are signature-based are hence ineffective. A fileless malware attack is catastrophic to any computer system due to its ability to evade any anti-virus protection implemented. Security practitioners hence have to utilize forensic tools in the fight against fileless malware. Example of detection techniques against fileless malware include detection that is rule-based, detection that monitors a system’s behavior, and detection through a process of learning the behavior of attack.
A security practitioner is an individual that is involved in the provision of security information and mitigation and prevention countermeasures against any threats (Dehghantanha et al., 2018). A security practitioner may be a Network Security Engineer, a Cybersecurity Specialist, Or an Information Technology Security Manager. The knowledge of how security threats have evolved over time may be valuable for any security practitioner. There is a need to understand what threats exist and how one may combat such threats. For example, fileless malware cannot be detected and dealt with through the utilization of traditional security measures, such as, anti-viruses. If a security practitioner is up-to date with the latest threats, then they will be in a position to suggest the best countermeasures for any organization (Saxena, 2018). In addition, comprehension of the various detection mechanisms as explained by Sushil Kumar Sudhakar in his article may serve as a knowledge-base against future attackers on any system.