Author: Richard Henderson

Welcome back to a another regular Lastline Threat Intelligence Briefing. This short email briefing intends to give Lastline customers and other interested parties a regular recap of the most important news and events surrounding malware in the world in the previous two weeks. You will...

As virtually every single person working in the world of security knows, last week was the annual RSA Conference. Tens of thousands of security-minded folk from all over the world converged in San Francisco to talk all things security. Let’s just get the elephant in the...

Welcome back to another Lastline Threat Intelligence Briefing. This email briefing intends to give Lastline customers and other interested parties a regular recap of the most important news and events surrounding malware in the world in the previous two weeks. We are providing links to...

The current state of malware is a conflicted one. On the one hand, data breaches involving malware have become less frequent in recent years. In its 2019 Data Breach Investigations Report (DBIR), Verizon found that malware had been active in 28 percent of data breaches...

We’re inclined to focus only on digital threats that emanate from outside the network. In so doing, however, we overlook a key risk: threats that come from within the network itself. I’ll use this blog post to discuss what these “insider threats” look like, what types...

When we think of a digital attack, I think many of us go straight to attack campaigns that involve exploiting application or operating system vulnerabilities. Not all attacks involve these, of course. There are plenty of attacks that solely leverage social engineering tactics to undermine...