Understanding File-Based Attacks

Illustration of bees on a vibrant honeycomb pattern. Some cells are highlighted in red with alert symbols, suggesting danger or anomaly. The Upwind logo is visible in the top right corner.

File-based attacks are a growing concern in cybersecurity. These attacks involve tampering with files to gain unauthorized access, steal information, or cover up malicious activities. In this post, we’ll break down what file-based attacks are, look at some real-world examples, and walk through a typical attack scenario. What Are File-Based Attacks? File-based attacks exploit how […]

Detect Suspicious Fileless Process Execution

Illustration of five surfboards standing upright on a beach with palm trees. Each has a command line icon. The text reads, Detect Suspicious Fileless Process Execution. A logo with the word upwind is at the top. The background is a gradient blue sky.

We’re excited to announce the ability to monitor and detect malicious “fileless execution” events. This capability enables alerting when a process is executed without using an executable file on a disk or file system. Fileless Execution The action of a process being executed using an in-memory executable file is a common defense evasion technique used […]