Ransomware: Too Overt to Hide [Part 2]
[Ransomware Series Part 2] Authored by: Alexander Sevtsov and Clemens Kolbitsch Find more details on this series in Part 1. Ransomware is holding...
[Ransomware Series Part 2] Authored by: Alexander Sevtsov and Clemens Kolbitsch Find more details on this series in Part 1. Ransomware is holding...
Authored by: Alexander Sevtsov and Clemens Kolbitsch Ransomware has become one of the most serious security threats today. Practically every business, public organization...
Authored by: Clemens Kolbitsch, Alexander Sevtsov, and Arunpreet Singh Find more details on this series in Part 1 and Part 2. Evasive scripts continue...
One of the characteristics of malware that we follow closely is its use of evasion techniques; that is, techniques that...
Authored by: Alexander Sevtsov, and Arunpreet Singh Find more details on this series in Part 1 and Part 3. The use of malicious...
Learn how Lastline’s process snapshotting supports malware analysis by capturing snapshots at various points throughout a malware program’s execution, allowing...
Authored by: Alexander Sevtsov, and Arunpreet Singh Find more details on this series in Part 2 and Part 3. Macro malware, introduced back...
Leveraging the new clustering feature of the Lastline Knowledge Base to study recent ransomware threats Authored by: Grégoire Jacob and Stefano...
Lastline’s solutions analyze network traffic, programs, documents, and other artifacts to identify and block advanced malware in enterprise networks. ...
Authored by: Subrat Sarkar, Arunpreet Singh, and Clemens Kolbitsch Diving deeply into the ModPOS malware framework using sandbox process snapshotting Point-of-sale (POS)...
This is an necessary category.
This is an non-necessary category.