University Security Lab Gets angr(y) – Makes it Easy to Analyze Binaries
Following the fallout of the Mirai botnet, security has risen to the top of the agenda for organizations buying connected...
Following the fallout of the Mirai botnet, security has risen to the top of the agenda for organizations buying connected...
By Andy Norton and Stefano Ortolani Lastline is witnessing a tremendous increase in malware samples that have a cryptocurrency mining purpose....
Sandboxes are very good at detecting malware. However, some sandbox architectures are significantly more effective than others when it comes...
Sandboxes are commonly deployed to detect malware, and in many cases, they can be quite effective. However, advanced malware families...
In recent years, machine learning has made tremendous strides in the fight against cybercrime. But it’s not foolproof, and criminals...
Browser-based cyberthreats have become one of the biggest concerns facing cybersecurity professionals today. It’s critical for organizations to implement effective...
One could argue that cybercriminals had a real break-out year in 2017. Huge data breaches, new malware techniques, and some...
In this article, we will look at recent developments in cryptocurrency, from a regulatory perspective and developments in cybercrime adoption. Cryptocurrency...
Generally speaking, there are two types of attacks against retailers: attacks at point of sale where a POS device is...
Lastline has uncovered a new attack vector launched through Microsoft Excel spreadsheets, and just recently expanded into other Office applications....
This is an necessary category.
This is an non-necessary category.