Malware Behavior Tag

There’s been a lot of freighting ransomware reports and statistics lately. But there is good news. At this year’s RSA security conference, Dr. Engin Kirda, Co-Founder and Chief Architect of Lastline, discussed the Achilles heel of ransomware, and how this dangerous malware can be detected...

Today's advanced malware will attack at multiple locations throughout an enterprise. To be effective, powerful malware detection capabilities must be integrated throughout an organization's entire network and security infrastructure.   Malware uses many routes or attack vectors to gain access to an...

Authored by: Clemens Kolbitsch, Joe Giron, and Arunpreet Singh Over recent years, we have seen a rapid evolution of security products. Whenever a new technology is introduced, it tackles shortcomings of its predecessor, but also faces new challenges as attackers adapt to the changing security landscape. Just to give...

Take a look inside the behaviors of detected malware to find out how evasion was attempted. Lastline Enterprise provides a comprehensive view of malware's behavior to date, context within your network, and known information from a vast database of threat intelligence. Lastline also provides information on...