Cybersecurity experts warn that hackers are increasingly exploiting fileless techniques using legitimate applications, such as PowerShell, to secretly launch malware attacks. A third of all cyber attacks now use these methods. The attacks typically start with a document containing malicious macros, before moving to memory-resident activities. They are difficult to detect due to their ability to blend in with regular system operations. Experts suggest using endpoint detection and response solutions, monitoring PowerShell, and scrutinising Active Directory for irregularities to combat these threats.

Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’
A sophisticated phishing campaign orchestrated by Pakistan-linked threat actors has been discovered targeting Indian government entities by impersonating the National Informatics Centre’s email services. The