Malware Analysis Tag

While it is normal to see a positive trend in terms of number of artifacts analyzed by our engines, a stark increase might in some cases be the telltale sign of a shift in the threat landscape. Just recently, our threat intelligence telemetry alerted us...

Malware and cybercrime continue to grow at alarming rates. Unfortunately, the world-wide shortage of security talent is making it very difficult for organizations to find the resources necessary to defend themselves. Given the lack of available experts, businesses need to do everything they...

Last week, banks in Australia, New Zealand, and Turkey saw the distribution of malware that steals credentials from users of their apps on Android phones and tablets, as well as intercepting the two-factor authentication codes users can receive via text message for increased security. Delivered in the...

Last week brought us a new ransomware flavor, Cerber. Perhaps its most novel aspect is the fact that, unlike other attacks that only leave their ransom notes via text files and popup windows, Cerber also leaves a sound file and a VBscript file that lets it gloat...

This afternoon at the RSA Conference in San Francisco, I will present on “Evasive Malware: Exposed and Deconstructed.” During that presentation, I’ll lead a discussion around the dramatic growth of evasive malware, the increasingly sophisticated behaviors observed in the past year, and what that means...

A walkthrough of event management in the Lastline Enterprise portal. Dealing with individual malware attack events is difficult — you have to look across a sea of events for other hosts on the network. Lastline makes event management easier. You can deal with all the events...

Walkthrough the analysis of downloaded files in the Lastline Enterprise portal. The "download" and "mail" tabs allow you to look at files downloaded by users on your network as an alternative to searching through events. This can be useful in gaining a comprehensive view of behaviors...

A quick overview of security event data in the Lastline Enterprise portal. With Lastline Enterprise you can quickly drill in and see the specifics of pertinent network compromises without having to look through a large volume of events or even numerous pieces of network infection information. For...