<aside> <img src="/icons/whale_gray.svg" alt="/icons/whale_gray.svg" width="40px" /> Malware Attack/Exploitation Techniques means the specific method by which malware code penetrates and infects a targeted system

</aside>

Some malware focuses on infecting the system’s memory to leverage remote procedure calls over the organization’s network.

Most modern malware uses file-less techniques to avoid detection by signature-based security software. File-less malware is used to create a process in the system memory without relying on the local file system of the infected host

How does this modern malware work?