Attackers Use Event Logs to Hide Fileless Malware

A sophisticated campaign utilizes a novel anti-detection method.

Source: https://threatpost.com/attackers-use-event-logs-to-hide-fileless-malware/179484/