Cyberattacks that are file based have improved in their efficacy as the relevant defense mechanisms have. One of these new prominent attack vectors is the use of fileless malware. Fileless malware operates by infiltrating the computer system without using the file system, which makes it much harder to detect and therefore counteract. The only leading ways to identify these attackers is through forensic security analysis, but these same attackers sometimes utilize anti forensics tools. This paper demonstrates the areas needed for improvement in order to combat the current threat landscape in cybersecurity.