Author: Brian Laing

Home Depot agrees to pay $25 Million more as a result of their 2014 data breach. Earlier this month Home Depot reached an agreement to pay $25 million more to banks and credit unions as a result of the company’s massive 2014 data breach.  The $25...

Evidence continues to mount that most enterprises need to dramatically improve their cybersecurity. During the last few years, the majority of data breaches were first discovered by entities other than the affected organization—a clear indication that something is wrong. In 2015, research conducted by Intel1 found...

No longer can cybersecurity be relegated to the IT department. The developing trend is for the C-Suite to be held directly accountable for cyber breaches. According to Business Insider:  Yahoo’s massive data breach caused CEO, Marissa Mayer to forfeit her annual bonus of around $2 million...

Machine Learning is an important component in detecting advanced malware, but to be effective it must be well-grounded with known threat intelligence. Dr. Giovanni Vigna, Co-founder and CTO of Lastline, presented his thoughts regarding advanced malware protection at this year’s RSA conference in San Francisco. He...

Corporations are spending more than ever before on cybersecurity, yet security incidents are still increasing. Are the wrong products being implemented? Thales just released their fifth annual Data Threat Report. They polled over 1,000 senior IT security executives at large corporations. Sixty-eight percent of them...

Ransomware hits both individuals and businesses, but businesses are being targeted more than ever, and end up paying significantly higher ransoms—often tens of thousands of dollars. This week, Los Angeles Valley College disclosed that it paid $28,000 in ransom to hackers who had used malicious software...

There's no question that cybercriminals benefit from the knowledge, tools, and experience of other hackers. They often band together to form powerful crime rings, sharing their techniques and the latest network vulnerability information. If we are to be successful battling these formidable adversaries, the security industry...

Exploit Kits are a serious cyber threat today and are responsible for the vast majority of malware infections worldwide.  Exploit kits are sophisticated but malicious programs designed and distributed by cyber criminals. They help fraudsters, hackers, and data thieves breach an organization's...

Lastline's unique approach takes dynamic document analysis to a whole new level. In my previous blog posting, I briefly covered static document analysis as one of two types of document analysis that are essential for effective detection of advanced malware. Today I...

Static document analysis is an essential component in advanced malware detection   One of the crucial functions of malware detection is the ability to spot advanced malicious code that's embedded within documents. Document files are key infection sources because: ...