Fighting Fileless Malware, Part 3: Mitigations
Attackers can dodge the countermeasures you employ against fileless malware. So how do you mitigate the damage?
Last week, in part 2 of this series on fileless attacks, we discussed countermeasures and how all those countermeasures can be circumvented. Yet, if all countermeasures can be circumvented, how does anyone begin to mitigate the impact of fileless attacks?
The most common and accepted solution is to patch whenever a vulnerability is announced as quickly as possible. When a security vulnerability is discovered, the software vendor is notified and (hopefully) takes responsible and rapid action to release a security patch. Customers then download the patch, test, and apply it to all of their systems that are impacted.