Author: Brian Laing

Ransomware hits both individuals and businesses, but businesses are being targeted more than ever, and end up paying significantly higher ransoms—often tens of thousands of dollars. This week, Los Angeles Valley College disclosed that it paid $28,000 in ransom to hackers who had used malicious software...

There's no question that cybercriminals benefit from the knowledge, tools, and experience of other hackers. They often band together to form powerful crime rings, sharing their techniques and the latest network vulnerability information. If we are to be successful battling these formidable adversaries, the security industry...

Exploit Kits are a serious cyber threat today and are responsible for the vast majority of malware infections worldwide.  Exploit kits are sophisticated but malicious programs designed and distributed by cyber criminals. They help fraudsters, hackers, and data thieves breach an organization's...

Lastline's unique approach takes dynamic document analysis to a whole new level. In my previous blog posting, I briefly covered static document analysis as one of two types of document analysis that are essential for effective detection of advanced malware. Today I...

Static document analysis is an essential component in advanced malware detection   One of the crucial functions of malware detection is the ability to spot advanced malicious code that's embedded within documents. Document files are key infection sources because: ...

Lastline has been recognized by CRN, the top news source for solution providers and the IT channel, as one of 2015’s hottest emerging technology vendors. CRN’s Emerging Vendors list annually identifies the rising security technology vendors with innovative products in North America who create new...