Fileless attacks are those that do not install any of their own malicious software on a victim machine's disk, but instead exploit preinstalled applications and built-in tools such as PowerShell to do their dirty work in memory. This approach makes them much more difficult to detect through conventional methods.