malware Tag

From Bad Rabbit to NotPetya, bad actors are constantly evolving their malware attack vectors–the methods they use to distribute sophisticated malware attacks. This ever-growing network threat landscape requires organizations to keep abreast of changes in the way in which malware is delivered. Keeping Pace with New...

The Lastline Daily Dose program supports National Cyber Security Awareness Month (NCSAM) with daily tips and advice to help individuals and organizations detect and prevent malware-based cyberattacks. Throughout October, Lastline will offer a daily dose of advice via Twitter (@Lastlineinc), LinkedIn, Facebook, and other social...

Effective malware analysis tools can help root out malicious short links and enhance the security of individuals and organizations. Referred to as short links, shortened URLs, or tiny URLs, these abbreviated versions of a URL have, at least in certain cases, a few advantages over fully...

During the last few months, we’ve been watching an interesting twist in malware analysis. Cybercriminals recently developed a technique where, in some cases, malware can infect a device when the victim simply hovers their mouse over a malicious link. The dangers of clicking on a link...

End-to-end malware analysis helps provide protection from infected objects residing on or flowing from all applications (email, websites, mobile, etc.) and all endpoint device types (Windows, Mac OS X, Android, iOS). Lastline’s proven integration with Carbon Black is assisting numerous organizations with realizing this important...

Executable compression, aka “packing,” is a means of compressing an executable file and combining the compressed data with decompression code into a single executable. Malware Packing Throughout the years, anti-malware vendors have educated their users about polymorphic malware. This kind of malware has mechanisms to “repackage” itself...

Cybercriminals commonly use malicious emails to deliver malware, including pernicious code that performs MitB (Man-in-the-Browser) attacks.   Although MitB threats are not new, cybercriminals are constantly developing new versions designed to defeat secure email gateways, the latest and most secure browsers, and other security controls. To...