Cybersecurity experts warn that hackers are increasingly exploiting fileless techniques using legitimate applications, such as PowerShell, to secretly launch malware attacks. A third of all cyber attacks now use these methods. The attacks typically start with a document containing malicious macros, before moving to memory-resident activities. They are difficult to detect due to their ability to blend in with regular system operations. Experts suggest using endpoint detection and response solutions, monitoring PowerShell, and scrutinising Active Directory for irregularities to combat these threats.

RSA Day One: Vibe Is 'All In' on AI for Security
At RSA, the focus has shifted from generative AI to agentic AI, highlighting the evolving discussions surrounding artificial intelligence. This transition emphasizes the increasing capabilities