Blog

Digital criminals are increasingly pivoting to the network after initially attacking an endpoint or publicly accessible cloud. Indeed, a network foothold enables attackers to move laterally to more valuable public cloud workloads. They can then steal their target organization’s sensitive information and monetize it in...

Though RSA is officially behind us, headlines surrounding the show continue to circulate. It’s no secret that attendees walking the halls of Moscone had a lot of pressing issues to think about. Health concerns aside, we made it our mission to get a better glimpse...

We understand that during these difficult times one’s cyber security duties do not simply stop; in many cases they become even more essential. Far-flung teams find themselves working from home in unsecure environments and often using unmanaged computing devices. Security teams are short-staffed and burning...

Welcome back to a another regular Lastline Threat Intelligence Briefing. This short email briefing intends to give Lastline customers and other interested parties a regular recap of the most important news and events surrounding malware in the world in the previous two weeks. You will...

As virtually every single person working in the world of security knows, last week was the annual RSA Conference. Tens of thousands of security-minded folk from all over the world converged in San Francisco to talk all things security. Let’s just get the elephant in the...