This research paper discusses how PoS RAM scrapers infect systems and exfiltrate stolen data, and provides a list of strategies and techologies that can be used to defend against the threat.
Because cyber criminals have developed more sophisticated ways to infiltrate an infrastructure, understanding how these threats evolve can help you find the best security solution.