Finally, after waiting...Black Cipher Security managed to bypass PAD360 and had to use the most sophisticated attack - Powershell through memory/RAM under hardening mode (Medium protection) although I suspect they rigged the test by allowing the uploaded backdoored application to "unblock" in the Cloud Console...still they need to use 3 tools combination namely, Powershell Empire, Metasploit and Veil-Evasion....and also they bypassed all other AV / Next GenAV from EmiSoft, Symantec, TrendMicro, F-Secure, Webroot, Avast, Sophos including its Intercept X, McAffee...upcoming..they are trying more including Cylance.....in fact, the only technology that can prevent their attack is Carbon Black with their own so called "Streaming Prevention" protection mechanism - apparently that is the product that they will introduce to corporate company or government. So all PAD360 users, please use Lock mode as Black Cipher said it blocked their backdoored application, hackers won't get far if they use this sophisticated attack. Apart from that, you are totally safe and secure under Lock mode. Oh by the way, apart from the 12 minutes bypass demo after their 6 days test and research....all other brand mentioned just now only took them between 5-7 minutes for a complete attack...and with only one tool Powershell Empire or just Metasploit. Powershell Fileless Attack is the real deal that all AV need to look out for. It won't leave any traces because it will not leave any files on the disk, it will not use any malware signature as it will uses existing Windows OS system apps like powershell and WMI to do hijacking, to steal data or to infect with ransomware through your PC RAM/memory. Stay safe everyone no matter what is your AV and ensure you have application whitelisting running with your AV so hackers cannot advanced further. Setup a log instances of powershell activity. Get notification and detect and take action. Last but not least, disable powershell if you dont use it, but still disabling won't prevent them from running their own powershell instances directly from their tool as the .NET dlls still running in your computer.