Lastline
Edit

Lastline

http://www.lastline.com/
Last activity: 30.05.2022
Active
Categories: AnalyticsArtificial IntelligenceCloudCybersecurityDataIndustryPlatformProductSecurityService
Lastline is innovating the way companies detect active breaches caused by advanced persistent threats, targeted attacks and evasive malware with its software-based Breach Detection Platform. Lastline’s open architecture integrates advanced threat defenses and intelligence into existing operational workflows and security systems. Inspection of suspicious objects occurs at scale in real time using a full-system emulation approach to sandboxing that is superior to virtual machine-based and OS emulation techniques. Lastline's technology correlates network and object analysis to achieve timely breach confirmation and incident response. Lastline was built by Anubis and Wepawet researchers and industry veterans with decades of experience focused specifically on advanced breach weaponry and tactics. Headquartered in Redwood City, California with offices throughout North America, Europe and Asia, Lastline’s platform is used by global managed security service providers, Global 2000 enterprises and leading security vendors worldwide. To learn more, visit www.lastline.com.
Likes
943
Followers
3.29K
Followers
6.42K
Website visits
17.3K /mo.
Mentions
41
Location: United States, California, San Mateo
Employees: 51-200
Phone: +1 805-456-7075
Total raised: $48.5M
Founded date: 2011

Investors 5

Funding Rounds 3

DateSeriesAmountInvestors
11.07.2017Series C$28.5M-
21.08.2014-$10M-
25.06.2013-$10Me.ventures

Mentions in press and media 41

DateTitleDescription
30.05.2022Космические пираты атакуют, или Как мы обнаружили новую APT-группировку с уникальными бэкдорамиЛетом 2021 года мы, специалисты экспертного центра безопасности Positive Technologies, выявили ранее неизвестную APT-группировку, которая действует по меньшей мере с 2017 года. Главные цели Space Pirates (именно так мы решили назвать группу...
11.11.2021Telemetry Peak Analyzer – An Automatic Malware Campaign DetectorContributors: Jason Zhang, Stefano Ortolani, Giovanni Vigna Cyber security threats have been growing significantly in both volume and sophistication over the past decade with no sign of a slowdown. Naturally, this has also been accompanied ...
30.09.2021Symbexcel: Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 MacrosOffice macros are a popular attack vector to compromise a user's environment and deploy additional components. That's because macros can hide within documents, often under several layers of obfuscation. In recent years, there has been an in...
13.08.2021Excel is still a security headache after 30 years because of this one featureImage: solarseven, Getty Images/iStockphoto Microsoft released Excel 4.0 for Windows 3.0 and 3.1 in 1992 and many companies still use this functionality in legacy operations. The problem is that bad actors have started using Excel sheets an...
04.06.2020VMware acquires network security firm Lastline, said to lay off 40% of staffVMware is acquiring network security firm Lastline, TechCrunch has learned. Since its launch in 2012, Lastline raised about $52.2 million, according to Crunchbase. Investors include Thomvest Ventures, which led the company’s $28.5 million S...
11.05.2020Cybercriminals exploiting the coronavirus to deploy infostealersCybercriminals have been busy devising email campaigns that take advantage of the coronavirus outbreak. By promising information or help about the pandemic, these attacks instead infect unsuspecting recipients with malware, often designed t...
25.02.2020The challenge of obtaining visibility into cloud securityDigital criminals are increasingly pivoting to the network after initially attacking an endpoint or publicly accessible cloud. Indeed, a network foothold enables attackers to move laterally to more valuable cloud workloads. They can then st...
14.08.2019C-Suite in the hot seat -- Execs' responsibility regarding digital securityAre you killing your numbers? Crushing your targets? Growing your team? Leading with authenticity and building a loyal following? What a shame it is that your tenure may already be over. While you were busy winning and shredding the competi...
11.07.2019Summer heightens cyber security risksYou might think that cyber attacks are a constant year round activity, or perhaps that they are focused on peak shopping periods like Christmas. But a new study from threat protection specialist Lastline reveals many security professionals ...
09.07.2019Can you hack my network? Why ethical hacking is essential for improving your securityCongratulations! You’ve selected and deployed a new cybersecurity solution. But, once you’re up and running you might not feel completely secure. Do you need to test your incident response process as much as testing the software? Does the n...
Show more

Reviews 0

Sign up to leave a review

Sign up Log In