Suspicious activity
Defender for Cloud: Fileless Attack Technique Detected
Risk Level
Informational (4)
Platform(s)
Description
The memory of the process specified below contains evidence of a fileless attack technique. Fileless attacks are used by attackers to execute code while evading detection by security software.-
Recommended Mitigation
It is recommended to review the permissions which were used to make this operation.