Author: Richard Henderson

The role of the Tier 1 Security Operations Center (SOC) Analyst varies across organizations, but almost always includes activities such as monitoring security dashboards to view events and alerts of potential threats, intrusions and indicators of compromise.  The Tier 1 analyst also typically performs initial...

Any attacker worth their salt know that foreign software can raise a red flag with your network monitoring tools or endpoint management products. That’s why they’re increasingly turning to “living off the land” (LotL) techniques, which involve exploiting commonly available tools and native software so...

Welcome back to a another regular Lastline Threat Intelligence Briefing. This short email briefing intends to give Lastline customers and other interested parties a regular recap of the most important news and events surrounding malware in the world in the previous two weeks. You will...

As virtually every single person working in the world of security knows, last week was the annual RSA Conference. Tens of thousands of security-minded folk from all over the world converged in San Francisco to talk all things security. Let’s just get the elephant in the...

Welcome back to another Lastline Threat Intelligence Briefing. This email briefing intends to give Lastline customers and other interested parties a regular recap of the most important news and events surrounding malware in the world in the previous two weeks. We are providing links to...

The current state of malware is a conflicted one. On the one hand, data breaches involving malware have become less frequent in recent years. In its 2019 Data Breach Investigations Report (DBIR), Verizon found that malware had been active in 28 percent of data breaches...