Fileless Malware Detection

Enhancing Threat Identification
and Notification

BluVector’s Speculative Code Execution (SCE) Engine is the security market’s first analytic specifically designed for fileless malware detection on the network. Using SCE, BluVector offers the greatest breadth of fileless malware coverage, including detection of JavaScript-, VBScript- and PowerShell-based attacks.

This capability comes as the cybersecurity industry has seen a significant spike in “invisible” or “memory-based” cyberattacks on enterprises.


BluVector Speculative Code Execution Engine Overview


BluVector’s Speculative Code Execution engine is capable of emulating how code will behave when executed in memory and to what extent these behaviors might initiate a security breach. By covering all potential execution chains and focusing on malicious capacity rather than malicious behavior, the technology vastly reduces the number of execution environments and the quantity of analytic results that must be investigated. The result, 99%+ fileless malware detection accuracy of this otherwise “invisible” threat.

Recent examples of threats that used such vectors of attack include “Petya,” “NotPetya” and “WannaCry.” Given the financial industry attacks using malicious advertising to infect users of the legitimate websites of financial institutions, this capability is especially relevant.


  • The engine operates on any network stream
  • Emulates how malware will behave when it is executed
  • Operates at line speeds
  • Multi-condition runtime heuristics
  • High accuracy ensures near zero false positives
  • Transparent detection

All Threat Reports