Malware Analysis Tag

Malware and cybercrime continue to grow at alarming rates. Unfortunately, the world-wide shortage of security talent is making it very difficult for organizations to find the resources necessary to defend themselves. Given the lack of available experts, businesses need to do everything they...

Last week, banks in Australia, New Zealand, and Turkey saw the distribution of malware that steals credentials from users of their apps on Android phones and tablets, as well as intercepting the two-factor authentication codes users can receive via text message for increased security. Delivered in the...

This afternoon at the RSA Conference in San Francisco, I will present on “Evasive Malware: Exposed and Deconstructed.” During that presentation, I’ll lead a discussion around the dramatic growth of evasive malware, the increasingly sophisticated behaviors observed in the past year, and what that means...

A walkthrough of event management in the Lastline Enterprise portal. Dealing with individual malware attack events is difficult — you have to look across a sea of events for other hosts on the network. Lastline makes event management easier. You can deal with all the events...

Walkthrough the analysis of downloaded files in the Lastline Enterprise portal. The "download" and "mail" tabs allow you to look at files downloaded by users on your network as an alternative to searching through events. This can be useful in gaining a comprehensive view of behaviors...

A quick overview of security event data in the Lastline Enterprise portal. With Lastline Enterprise you can quickly drill in and see the specifics of pertinent network compromises without having to look through a large volume of events or even numerous pieces of network infection information. For...