Home Cybersecurity A Ghost Attacker in RAM: Neutralizing a Fileless Breach