Defense strategies in most organizations generally anticipate that an attacker will make some changes to the files on a system, create a log of activity that can be detected by a SIEM (Security Information and Event Management software), trigger some other type of file, or log-based vector. However, fileless malware…