Author: Brian Laing

Effective malware analysis tools can help root out malicious short links and enhance the security of individuals and organizations. Referred to as short links, shortened URLs, or tiny URLs, these abbreviated versions of a URL have, at least in certain cases, a few advantages over fully...

Malicious links are not new, but they continue to plague us. Research shows that a significant number of people will click on a link in an email, web page, or document without taking a second thought, and all too often, end up infecting their device...

Drive-By Downloads are one of the most common methods used by cybercriminals to install malware and gain unauthorized access to your device. To protect yourself from these dangerous attacks, it’s critical to know how they work, and what steps you can take to thwart them. What...

End-to-end malware analysis helps provide protection from infected objects residing on or flowing from all applications (email, websites, mobile, etc.) and all endpoint device types (Windows, Mac OS X, Android, iOS). Lastline’s proven integration with Carbon Black is assisting numerous organizations with realizing this important...

Cybercriminals commonly use malicious emails to deliver malware, including pernicious code that performs MitB (Man-in-the-Browser) attacks.   Although MitB threats are not new, cybercriminals are constantly developing new versions designed to defeat secure email gateways, the latest and most secure browsers, and other security controls. To...

Infected PDF files continue to plague security personnel responsible for detecting and containing malicious email attachments. Cybercriminals use many different tactics to breach an organization’s network defenses, and delivering infected PDF files, typically via email, remains a very common and dangerous threat. Unfortunately, Secure Email Gateways...