Advanced Malware Tag

Sandboxes are very good at detecting malware. However, some sandbox architectures are significantly more effective than others when it comes to identifying the more advanced strains of malware. The idea behind a sandbox is simple—it’s an isolated, secure environment to open a file and determine if...

Sandboxes are commonly deployed to detect malware, and in many cases, they can be quite effective. However, advanced malware families are capable of outsmarting conventional or even next-generation sandboxes that are based on virtualization technology, which is to say that they run on virtual machines. Two...

Effective malware analysis tools can help root out malicious short links and enhance the security of individuals and organizations. Referred to as short links, shortened URLs, or tiny URLs, these abbreviated versions of a URL have, at least in certain cases, a few advantages over fully...

Three days of crowded presentations attest to extreme interest in advanced malware protection and the importance of quickly detecting and responding to data breaches. [embed width="700" height="400"]https://www.slideshare.net/lastlinesecurity/infosec-europe-2017-highlights-lastline-inc[/embed]    Infosecurity Europe 2017 This past week, Lastline was a sponsor of Infosecurity Europe, the region’s largest and most important information...

Machine Learning is an important component in detecting advanced malware, but to be effective it must be well-grounded with known threat intelligence. Dr. Giovanni Vigna, Co-founder and CTO of Lastline, presented his thoughts regarding advanced malware protection at this year’s RSA conference in San Francisco. He...

Lastline’s unique architecture protects organizations from advanced fileless malware. Last week at the RSA security conference, Christopher Kruegel, Lastline co-founder and CEO, gave a remarkable presentation about detecting fileless web threats—a new capability present in the spring 2017 release of Lastline Enterprise. During his presentation, Kruegel...

Corporations are spending more than ever before on cybersecurity, yet security incidents are still increasing. Are the wrong products being implemented? Thales just released their fifth annual Data Threat Report. They polled over 1,000 senior IT security executives at large corporations. Sixty-eight percent of them...

Freely available, public networks are a huge asset to the world, and they get plenty of use. One global supplier of software for public networks, Purple Wi-Fi, reports that almost half of us who carry a laptop, tablet, or smart phone, will connect to a...

Ransomware hits both individuals and businesses, but businesses are being targeted more than ever, and end up paying significantly higher ransoms—often tens of thousands of dollars. This week, Los Angeles Valley College disclosed that it paid $28,000 in ransom to hackers who had used malicious software...