Date | Title | Description |
30.05.2022 | Космические пираты атакуют, или Как мы обнаружили новую APT-группировку с уникальными бэкдорами | Летом 2021 года мы, специалисты экспертного центра безопасности Positive Technologies, выявили ранее неизвестную APT-группировку, которая действует по меньшей мере с 2017 года. Главные цели Space Pirates (именно так мы решили назвать группу... |
11.11.2021 | Telemetry Peak Analyzer – An Automatic Malware Campaign Detector | Contributors: Jason Zhang, Stefano Ortolani, Giovanni Vigna
Cyber security threats have been growing significantly in both volume and sophistication over the past decade with no sign of a slowdown. Naturally, this has also been accompanied ... |
30.09.2021 | Symbexcel: Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros | Office macros are a popular attack vector to compromise a user's environment and deploy additional components. That's because macros can hide within documents, often under several layers of obfuscation. In recent years, there has been an in... |
13.08.2021 | Excel is still a security headache after 30 years because of this one feature | Image: solarseven, Getty Images/iStockphoto
Microsoft released Excel 4.0 for Windows 3.0 and 3.1 in 1992 and many companies still use this functionality in legacy operations. The problem is that bad actors have started using Excel sheets an... |
04.06.2020 | VMware acquires network security firm Lastline, said to lay off 40% of staff | VMware is acquiring network security firm Lastline, TechCrunch has learned.
Since its launch in 2012, Lastline raised about $52.2 million, according to Crunchbase. Investors include Thomvest Ventures, which led the company’s $28.5 million S... |
11.05.2020 | Cybercriminals exploiting the coronavirus to deploy infostealers | Cybercriminals have been busy devising email campaigns that take advantage of the coronavirus outbreak. By promising information or help about the pandemic, these attacks instead infect unsuspecting recipients with malware, often designed t... |
25.02.2020 | The challenge of obtaining visibility into cloud security | Digital criminals are increasingly pivoting to the network after initially attacking an endpoint or publicly accessible cloud. Indeed, a network foothold enables attackers to move laterally to more valuable cloud workloads. They can then st... |
14.08.2019 | C-Suite in the hot seat -- Execs' responsibility regarding digital security | Are you killing your numbers? Crushing your targets? Growing your team? Leading with authenticity and building a loyal following? What a shame it is that your tenure may already be over.
While you were busy winning and shredding the competi... |
11.07.2019 | Summer heightens cyber security risks | You might think that cyber attacks are a constant year round activity, or perhaps that they are focused on peak shopping periods like Christmas. But a new study from threat protection specialist Lastline reveals many security professionals ... |
09.07.2019 | Can you hack my network? Why ethical hacking is essential for improving your security | Congratulations! You’ve selected and deployed a new cybersecurity solution. But, once you’re up and running you might not feel completely secure. Do you need to test your incident response process as much as testing the software? Does the n... |
17.06.2019 | 3 attacks you'd miss without AI | There has been a lot of hype around AI to the point where some people are simply tuning it out. I think this is a mistake. While there are limits to what AI can do, there also are sophisticated attacks that we’d miss without it.
The need fo... |
23.05.2019 | Do IoT devices really pose a security risk, or is it merely paranoia? | Market data firm Statista projects that by 2025, there will be 75 billion IoT devices in use. Smart devices are now found throughout most commercial offices, yet a lack of security could make them ticking time bombs. IoT devices often come ... |
09.05.2019 | Uncovering the everyday frustrations of cybersecurity professionals | Anyone who has worked in IT knows that it can be a frustrating experience at times. A new survey carried out by network security provider Lastline at RSAC 2019 set out to discover security professionals' attitudes and frustrations towards t... |
11.04.2019 | Security professionals think cybersecurity is a bigger threat to the US than border security | A new survey of security professionals taken at this year's RSA reveals that 92 percent of respondents feel that cybersecurity is a bigger threat to the US than border security. Yet government, and media, attention seems far more focused on... |
30.03.2019 | Is GDPR the new hacker scare tactic? | No one questions the good intent behind the EU’s General Data Protection Regulation (GDPR) legislation, or the need for companies to be more careful with the proprietary information they have about clients, patients, and other individuals t... |
04.03.2019 | Cybersecurity statistics for 2019: The chances your business will be attacked | With every passing year, cybercrime gets worse. It makes sense: it’s lucrative. Cybercrime is estimated to be a $1.5 trillion industry, with some countries now basing their economy around cybercrime. As a result, cybercriminals are now embo... |
13.12.2018 | Email security threats that can ruin your company's holiday season | Most people understand that retail becomes a target for cybercriminals during the holidays. But even businesses not related to the retail sector will often find the holidays their most vulnerable time of year. After all, many individuals (t... |
21.11.2018 | Stop focusing your information security efforts on the wrong things! | There once was a time not all that long ago when security teams could plead ignorant to IT security risks, with minimal possible consequence in terms of any significant damage coming to the company. Those days are long gone. We’ve reached a... |
18.10.2018 | Can the infosec community ever be as well-organized as digital criminals? | Brian Gladstein, a security marketing strategist at Carbon Black, discussed the question posed in this headline at RSA Conference 2018. In his presentation entitled "Endpoint Security and the Cloud: How to Apply Predictive Analytics an... |
27.09.2018 | Schools should offer formal information security classes | Digital threats are evolving fast and that leads to increasing demand for security professionals to tackle them. A new report from AI-driven security company Lastline looks at how existing practitioners feel about education in their field.
... |
16.08.2018 | Telecoms industry sees a higher percentage of advanced attacks | Threat intelligence specialist Lastline produces regular reports on the global cyberthreat landscape.
Its latest study looks at the telecoms industry and how the threats it faces differ from those in the wider world. Among the findings are ... |
05.06.2018 | Sophisticated keyloggers target financial services companies | Analysis of malware samples found among finance firms has uncovered an unusually large number of iSpy keylogger samples. iSpy is a variant of the notorious HawkEye logger.
Network-based malware protection specialist Lastline intercepted the... |
24.05.2018 | Cryptocurrency not a major threat to enterprises say security professionals | While 84 percent of security professionals believe cryptocurrencies are here to stay, most don't see them as a major threat to the enterprise, despite the rise in cryptomining attacks.
A study from network protection specialist Lastline sho... |
15.05.2018 | Malware insights -- How do you stack up? | In April, Lastline launched the first of our Malscape Monitor reports, for the fourth quarter of 2017. The report analyzes data from our Global Threat Intelligence Network to provide several insights and benchmarks on encounter rates with m... |
24.04.2018 | 90 percent of malware given unhelpful labels by AV tools | According to a new study, 90 percent of malicious files are given generic labels by AV tools, such as 'trojan.generic', providing limited guidance for successful remediation and leaving enterprises exposed to subsequent attacks resulting fr... |
30.03.2018 | What's the probability of a data breach happening to you? Or is that the wrong question? | Correctly calculating the probability of risk is becoming critical to organizations. And it’s not just because it is essential and fundamental to good Risk Management practice, but also because new laws such as GDPR are mandating it. Securi... |
09.03.2018 | Microsoft Windows Defender fights off massive currency miner attack | Microsoft has stopped a large scale malware distribution campaign that tried to infect almost 500,000 Windows PCs with a cryptocurrency miner.
Windows Defender antivirus software detected 80,000 instances of several Trojans with the payload... |
25.01.2018 | How cybercriminals are attacking machine learning | Machine learning (ML) is getting a lot of attention these days. Search engines that autocomplete, sophisticated Uber transportation scheduling and recommendations from social sites and online storefronts are just a few of the daily events t... |
11.07.2017 | Lastline Secures $28.5M in Series C Funding | Lastline, Inc., a Redwood City, Calif.-based advanced malware protection platform provider, secured $28.5m in Series C funding.
The round was led by Thomvest Ventures with participation from Osage University Partners, Redpoint Ventures, Bar... |
11.07.2017 | Term Sheet — Tuesday, July 11 | OPEN MIC
Good morning. Today we have more reader feedback. This edition is focused on everything not related to the sexual harassment scandal: Startup failure rates, Blue Apron, and corporate innovation.
Paid Content You can't secure what y... |
03.02.2015 | Lastline Partners with Bit9 + Carbon Black to Deliver Comprehen-sive Network and Endpoint Breach Protection | REDWOOD CITY, Calif. — Feb. 3, 2015 — Lastline, a global breach detection platform provider, today announced a partnership and technology integration with Bit9 + Carbon Black, the leader in endpoint threat prevention, detection and response... |
25.08.2014 |
Lastline Gets $10M For Malware Protection
| Lastline, a developer of cybersecurity software for malware defense, which has its research and development headquarters in Goleta, has raised $10M more in funding. According to Lastline, the funding came from Dell Ventures and Presidio Ven... |
21.08.2014 | Lastline Raises $10m in Funding | Lastline, a Redwood City, Calif.-based advanced malware defense platform provider, raised $10m in funding.
Backers included new investors Dell Ventures and Presidio Ventures, as well as existing investors Redpoint Ventures and e.ventures.
T... |
21.08.2014 | Lastline Grabs $10M Funding Round |
REDWOOD CITY, CA, Lastline, an advanced malware defense platform provider, has raised $10 million from new investors Dell Ventures and Presidio Ventures.
>> Click here for more funding data on Lastline
>> To export Lastline ... |
21.08.2014 | Lastline Secures $10 Million Funding Round | Funding from Dell Ventures, Presidio Ventures, Redpoint Ventures and eVentures to Extend the Lastline Advanced Malware Defense Platform, Security Team and Strategic Partnerships
REDWOOD CITY, Calif.–(BUSINESS WIRE)–August 21, 2014–
Lastline... |
03.04.2014 | WatchGuard Reinvents Advanced Persistent Threat Management with Launch of APT Blocker | New APT solution provides real-time, advanced-threat visibility for UTM and Next-Gen Firewall appliances
Advanced, cloud-based, full-system-emulation sandbox protects in minutes, not hours
APT Infographic
3 April 2014 - WatchGuard® Technolo... |
25.06.2013 | Lastline Raises $10M in Funding |
SANTA BARBARA, CA, Provider of active malware defense solutions for businesses, today announced it has raised $10 million in funding led by Redpoint Ventures and e.ventures.
>> Click here for more funding data on Lastline
>>... |
25.06.2013 | Lastline Raises $10M From Redpoint Ventures And E.Ventures For Its Malware Protection Service | Lastline, a service that offers a range of solutions for protecting businesses from malware, just announced that it has raised a $10 million funding round led by Redpoint Ventures and e.ventures. The service, which provides organizations wi... |
25.06.2013 | Lastline Raises $10M in Funding | Lastline, Inc., a Santa Barbara, CA-based provider of active malware defense solutions for businesses, raised $10m in funding.
The round was led by Redpoint Ventures and e.ventures. In conjunction with the funding, Redpoint Ventures Partner... |
25.06.2013 |
Lastline Finds $10M For Malware Defense Software
| - |
- | Lastline Secures $10 Million Funding Round | Lastline Secures $10 Million Funding Round
September 2014 by Marc Jacob
Lastline, an advanced malware defense platform provider, has raised $10 million from new investors Dell Ventures and Presidio Ventures, as well as existing investors Re... |