Author: Bert Rankin

At Lastline we take great pride in our partnerships and ability to integrate with other security tools. For example, with more than 90 percent of data breaches attributed to phishing schemes, our partnership with PhishMe provides a critical degree of added protection against such attacks. Lastline...

In a previous blog, titled Evasive Malware – The Art of Doing Nothing, we covered how advanced malware evades detection by stalling and postponing all malicious activity whenever a sandbox is detected.  In today's blog, we'll look at another sophisticated evasion technique...

Advanced malware uses a number of techniques to avoid being detected by a sandbox. One method is to stall. When a malicious object discovers that it's under evaluation, it will postpone evil behavior until the sandbox times out. The malware simply hides its...

One of the common misconceptions regarding a conventional sandbox is how much it can actually observe when evaluating an object for malicious behavior. Because a conventional sandbox runs in an isolated virtual machine environment, an object can safely execute without risk of...

Today, Lastline is proud to announce that Best in Biz Awards 2016 has named Lastline as one of the Most Innovative Companies in its category. The sixth annual program garnered more than 600 entries from an impressive array of North American companies and...

If the past is any predictor of the future, we can expect a dramatic surge of malware infections during the next several weeks. Historically, the number of malware infections has increased significantly during November and December. This annual spike is primarily driven...

Most malware detection systems identify malicious code by monitoring its execution in a sandbox environment to detect anomalous behavior. As the malware runs, the sandbox searches for signs of odd or unauthorized actions like: Elevating privileges to "administrator" or...