Cybercrime Tag

Understanding how malware works, and in particular, the strategies and tactics most often used by malware authors is vitally important for cybersecurity professionals. In other blog posts, Lastline provides a brief history of malware and basic malware types. In this post, we’ll look at some...

NOTE: In this blog, we typically focus on specific aspects of malware, cybercrime, security threats, and network breaches. For this post, we thought we’d take a large step backward and provide some foundational information as context for understanding the capabilities and variations of today’s malware....

Imagine going to work, sitting at a desk, and pulling out your toolbox: a rootkit. Though it may seem dystopian, cybercrime has become a business enterprise. Cybercriminals are now modeling themselves based on big businesses, adopting their processes and project management techniques. Professional hacking organizations...

With the significant growth of the Android operating system, cybercriminals are increasingly using the platform for malicious purposes, and organizations can no longer ignore these threats. This post describes the most effective techniques for detecting Android-based malware, and thwarting it.  In 2017, Android overtook Microsoft Windows...

In recent years, machine learning has made tremendous strides in the fight against cybercrime. But it’s not foolproof, and criminals have developed techniques to undermine its effectiveness. In today’s adversarial environment, organizations must deploy technologies that are resilient to attacks against machine learning. Machine Learning—Amazing, but...

As in recent years, 2017 has been marked by an increasing number of cyberattacks, and indications point to another tumultuous year as we head into 2018. With companies storing more data in the cloud and the number of Internet-connected devices rapidly increasing, the appeal and opportunity...

Preventing Business Email Compromise is critical for organizations everywhere. Here’s a quick overview of this malicious email-based threat and how to stop it. Sometimes referred to as “whaling” since it specifically targets or impersonates an organization’s biggest fish, in a BEC campaign, the attacker sends an...

The idea of fileless malware has received a lot of attention lately, and with good reason. In its relatively short life, fileless malware has successfully infiltrated a number of financial and other institutions that are generally thought of as being very secure, and at least...

Businesses face a constantly increasing number of email-based attacks, and secure email gateways (SEG) are not always able to detect them. Augmenting your SEG with advanced malware protection is critical. Cybercriminals continue to use email as a primary attack vector. The sophistication of these attacks is...