malicious code Tag

Ransomware hits both individuals and businesses, but businesses are being targeted more than ever, and end up paying significantly higher ransoms—often tens of thousands of dollars. This week, Los Angeles Valley College disclosed that it paid $28,000 in ransom to hackers who had used malicious software...

At Lastline we take great pride in our partnerships and ability to integrate with other security tools. For example, with more than 90 percent of data breaches attributed to phishing schemes, our partnership with PhishMe provides a critical degree of added protection against such attacks. Lastline...

In a previous blog, titled Evasive Malware – The Art of Doing Nothing, we covered how advanced malware evades detection by stalling and postponing all malicious activity whenever a sandbox is detected.  In today's blog, we'll look at another sophisticated evasion technique...

One of the common misconceptions regarding a conventional sandbox is how much it can actually observe when evaluating an object for malicious behavior. Because a conventional sandbox runs in an isolated virtual machine environment, an object can safely execute without risk of...

Most malware detection systems identify malicious code by monitoring its execution in a sandbox environment to detect anomalous behavior. As the malware runs, the sandbox searches for signs of odd or unauthorized actions like: Elevating privileges to "administrator" or "root" when the program doesn't ordinarily...

Lastline's unique approach takes dynamic document analysis to a whole new level. In my previous blog posting, I briefly covered static document analysis as one of two types of document analysis that are essential for effective detection of advanced malware. Today I...

Static document analysis is an essential component in advanced malware detection   One of the crucial functions of malware detection is the ability to spot advanced malicious code that's embedded within documents. Document files are key infection sources because: ...