A fileless attack (“memory-based” or “living-off-the-land,” for example) is one in which an attacker uses existing software, allowed applications and authorized protocols to carry out malicious activities. More and more attackers are moving away from traditional malware—in fact, 60% of today’s attacks involve fileless techniques. These attacks are capable of gaining control of computers without using traditional executable files as a first level of attack.