During incident response, a team of security specialists needs to follow the artefacts that attackers have left in the network. Artefacts are stored in logs, memories and hard drives. Unfortunately, each of these storage media has a limited timeframe when the required data is available.
Article Link: http://www.securitynewspaper.com/2017/02/09/fileless-attacks-enterprise-networks/