Phishing Tag

Phishing has been a profitable attack vector for criminals for more than 20 years. The reasons for its success are quite diverse. Throughout this blog, we will provide an overview of different types of phishing, the techniques that are used in phishing attempts and how...

Ransomware attacks may no longer be a media darling since they’ve been around for some time, but they are still going strong, and account for nearly 24 percent of incidents where malware was used according to the 2019 Verizon Data Breach Investigations Report.  There’s been...

When we think of a digital attack, I think many of us go straight to attack campaigns that involve exploiting application or operating system vulnerabilities. Not all attacks involve these, of course. There are plenty of attacks that solely leverage social engineering tactics to undermine...

Your organization's biggest security threat is a tool your employees use every day. Even now, with advances in the Internet of Things (IoT) and personal devices, email remains the most common vector of cyberattack. Approximately 76% of organizations in 2017 experienced phishing attacks – and this...

NOTE: In this blog, we typically focus on specific aspects of malware, cybercrime, security threats, and network breaches. For this post, we thought we’d take a large step backward and provide some foundational information as context for understanding the capabilities and variations of today’s malware....

One could argue that cybercriminals had a real break-out year in 2017. Huge data breaches, new malware techniques, and some headline-grabbing attacks. Our top 10 blog posts demonstrate the interest in what the bad guys are up to, and how to defend against it. From...

The Lastline Daily Dose program supports National Cyber Security Awareness Month (NCSAM) with daily tips and advice to help individuals and organizations detect and prevent malware-based cyberattacks. Throughout October, Lastline will offer a daily dose of advice via Twitter (@Lastlineinc), LinkedIn, Facebook, and other social...

Effective malware analysis tools can help root out malicious short links and enhance the security of individuals and organizations. Referred to as short links, shortened URLs, or tiny URLs, these abbreviated versions of a URL have, at least in certain cases, a few advantages over fully...