Author: Bert Rankin

Lastline’s unique architecture protects organizations from advanced fileless malware. Last week at the RSA security conference, Christopher Kruegel, Lastline co-founder and CEO, gave a remarkable presentation about detecting fileless web threats—a new capability present in the spring 2017 release of Lastline Enterprise. During his presentation, Kruegel...

Lastline's new release of our flagship product, Lastline Enterprise adds a number of capabilities, including early warning of unusual or suspicious network activity, detection of browser-based attacks, and accelerated incident investigation. Lastline's New 2017 Release It’s always an exciting event when we announce a new version of...

Five major roadblocks stop most organizations from adequate defense against cyber-crime The numerous data breach headlines continually remind us of an ugly truth. Far too many organizations are unprepared for today’s sophisticated and constant barrage of cyber-attacks. By why is this? Why are so many corporations ill...

As always, malware continues to grow in sophistication and power. Here’s another case in point. We’ve been closely following ransomware as it expands its primary focus from individuals to include businesses. Now we’re seeing the next evolution of this ugly form of crimeware. A recent wave...

Freely available, public networks are a huge asset to the world, and they get plenty of use. One global supplier of software for public networks, Purple Wi-Fi, reports that almost half of us who carry a laptop, tablet, or smart phone, will connect to a...

Malware and cybercrime continue to grow at alarming rates. Unfortunately, the world-wide shortage of security talent is making it very difficult for organizations to find the resources necessary to defend themselves. Given the lack of available experts, businesses need to do everything they...

At Lastline we take great pride in our partnerships and ability to integrate with other security tools. For example, with more than 90 percent of data breaches attributed to phishing schemes, our partnership with PhishMe provides a critical degree of added protection against such attacks. Lastline...

In a previous blog, titled Evasive Malware – The Art of Doing Nothing, we covered how advanced malware evades detection by stalling and postponing all malicious activity whenever a sandbox is detected.  In today's blog, we'll look at another sophisticated evasion technique...

Advanced malware uses a number of techniques to avoid being detected by a sandbox. One method is to stall. When a malicious object discovers that it's under evaluation, it will postpone evil behavior until the sandbox times out. The malware simply hides its...