malware Tag

The current state of malware is a conflicted one. On the one hand, data breaches involving malware have become less frequent in recent years. In its 2019 Data Breach Investigations Report (DBIR), Verizon found that malware had been active in 28 percent of data breaches...

The Worldwide Threat Assessment of the US Intelligence Community is a report produced by the Office of the Director of National Intelligence (DNI). Based on the intelligence received by the DNI from various intelligence agencies in the United States, the report covers a wide range...

The Latest 100 Threats Seen in Finance . . . Lastline® sequences and indexes millions of submissions to our Global Threat Intelligence Network. This snapshot explores the latest 100 malicious samples analyzed by Lastline that target the finance sector or finance departments across industries. This snapshot...

Understanding how malware works, and in particular, the strategies and tactics most often used by malware authors is vitally important for cybersecurity professionals. In other blog posts, Lastline provides a brief history of malware and basic malware types. In this post, we’ll look at some...

NOTE: In this blog, we typically focus on specific aspects of malware, cybercrime, security threats, and network breaches. For this post, we thought we’d take a large step backward and provide some foundational information as context for understanding the capabilities and variations of today’s malware....