malware Tag

End-to-end malware analysis helps provide protection from infected objects residing on or flowing from all applications (email, websites, mobile, etc.) and all endpoint device types (Windows, Mac OS X, Android, iOS). Lastline’s proven integration with Carbon Black is assisting numerous organizations with realizing this important...

Executable compression, aka “packing,” is a means of compressing an executable file and combining the compressed data with decompression code into a single executable. Malware Packing Throughout the years, anti-malware vendors have educated their users about polymorphic malware. This kind of malware has mechanisms to “repackage” itself...

Cybercriminals commonly use malicious emails to deliver malware, including pernicious code that performs MitB (Man-in-the-Browser) attacks.   Although MitB threats are not new, cybercriminals are constantly developing new versions designed to defeat secure email gateways, the latest and most secure browsers, and other security controls. To...

What we know about the NotPetya ransomware attack that started in Ukraine Overview of NotPetya This is a new variant of the Petya ransomware family that targets Windows systems. The outbreak began Tuesday morning. It has been referred to by several names, including PetrWrap, GoldenEye, Petya.A, Petya.C,...

The media has widely covered the WannaCry ransomware attacks. It would be difficult to find anyone who hasn’t heard about WannaCry, even among those that don’t follow technology. One positive outcome of this publicity is a significant increase in awareness. That’s a good thing. There...

Verizon’s recently released 2017 Data Breach Investigation Report shows that in 81% of the hacking-related breaches that were studied, cybercriminals used stolen passwords to gain access to their victim’s information systems. This sobering statistic highlights the need for organizations to detect and prevent password theft...