Lastline Enterprise Tag

We regularly monitor for spikes of malicious activity within our analysis results that we can relate to new malware campaigns. One such spike occurred on April 11, when we saw a significant increase in malicious PDF files in every region of the world. I wanted to...

Businesses face a constantly increasing number of email-based attacks, and secure email gateways (SEG) are not always able to detect them. Augmenting your SEG with advanced malware protection is critical. Cybercriminals continue to use email as a primary attack vector. The sophistication of these attacks is...

Evidence continues to mount that most enterprises need to dramatically improve their cybersecurity. During the last few years, the majority of data breaches were first discovered by entities other than the affected organization—a clear indication that something is wrong. In 2015, research conducted by Intel1 found...

As the instigators of many cybersecurity attacks, it’s critical to discover and defeat Droppers.   There’s been a lot of excitement lately about malware droppers. So just what are they, and why do we care? A dropper is malicious software whose main purpose is to install other...

Lastline’s unique architecture protects organizations from advanced fileless malware. Last week at the RSA security conference, Christopher Kruegel, Lastline co-founder and CEO, gave a remarkable presentation about detecting fileless web threats—a new capability present in the spring 2017 release of Lastline Enterprise. During his presentation, Kruegel...

Lastline's new release of our flagship product, Lastline Enterprise adds a number of capabilities, including early warning of unusual or suspicious network activity, detection of browser-based attacks, and accelerated incident investigation. Lastline's New 2017 Release It’s always an exciting event when we announce a new version of...

As always, malware continues to grow in sophistication and power. Here’s another case in point. We’ve been closely following ransomware as it expands its primary focus from individuals to include businesses. Now we’re seeing the next evolution of this ugly form of crimeware. A recent wave...

Freely available, public networks are a huge asset to the world, and they get plenty of use. One global supplier of software for public networks, Purple Wi-Fi, reports that almost half of us who carry a laptop, tablet, or smart phone, will connect to a...