Lastline to be Acquired by VMware
Lastline Cyber Security Blog | Malware Research & Analysis
by John DiLullo
4y ago
Today I am thrilled to announce that Lastline has entered into a definitive agreement to be acquired by VMware. The transaction has received the approval of both companies’ Boards, but is potentially subject to certain regulatory approvals. The transaction is expected to close in VMware’s Q2 FY21 ending July 31, 2020. The protection of our customers is at the center of what we do at Lastline. By joining forces with VMware, we will be able to offer additional capabilities to our customers and bring to market comprehensive security solutions for the data center, branch office and remote and mobi ..read more
Visit website
The Importance of Security Software Integrations and How They Influence Purchase Decisions
Lastline Cyber Security Blog | Malware Research & Analysis
by Greg Enriquez
4y ago
When it comes to cybersecurity, it’s well understood that there’s no silver bullet. Organizations need a combination of products to effectively implement a layered defense. Having these solutions working together, exchanging information, is essential to improved security as well as managing the workload of a security team. Your security stack is truly an ecosystem that, like all ecosystems, must work together and will change over time. Effective security hinges on the whole layered defense system working together. Integrations can shore up any gaps, improve individual layers, and help with the ..read more
Visit website
Evolution of Excel 4.0 Macro Weaponization
Lastline Cyber Security Blog | Malware Research & Analysis
by James Haughom
4y ago
Abstract Excel 4.0 (XL4) macros are becoming increasingly popular for attackers, as security vendors struggle to play catchup and detect them properly. This technique provides attackers a simple and reliable method to get a foothold on a target network, as it simply represents an abuse of a legitimate feature of Excel, and does not rely on any vulnerability or exploit. For many organizations, blacklisting isn’t a viable solution, and any signatures to flag these samples must be precise enough not to trigger on files that leverage this feature legitimately. As this is a 30-year-old feature that ..read more
Visit website
Mitigate M&A Network Security Risks
Lastline Cyber Security Blog | Malware Research & Analysis
by Chad Skipper
4y ago
Growth Through Acquisition Introduces New Risks When an organization acquires another company, the acquisition team must ensure it has security professionals involved in order to make sure that they don’t expose the acquiring company to threats that may exist undetected on the acquired company’s network. Far too often in the past acquisitions left security evaluations out of the equation and inherited substantial security debt… or worse, integrated the acquired company into their organization without any security vetting at all. While similar challenges exist (and similar solutions apply) when ..read more
Visit website
Being Secure While Working Remotely
Lastline Cyber Security Blog | Malware Research & Analysis
by Engin Kirda
4y ago
[NOTE: Dr. Kirda shared similar thoughts as part of our Lastline Speaks video series.] Like most of you, I’m stuck at home because of the COVID-19 virus. Two questions that I’ve been hearing a lot lately are: Is working remotely secure, and what kind of security problems might I face? I think it’s safe to say that most home environments are less secure than a classic working environment where you have network monitoring systems, firewalls, and security policies in place. Using a VPN to Connect to Your Company Network This does not mean however that you cannot work securely from home. To be ab ..read more
Visit website
5 Truths About AI in Cybersecurity – Truth #3: Good Training Data Can Be Hard to Get
Lastline Cyber Security Blog | Malware Research & Analysis
by Dr. Christopher Kruegel
4y ago
Truth #2 described how linear classifiers will result in lots of false positives and false negatives. More sophisticated data modeling is needed. And what is necessary for those models to be properly trained is data, lots of data! That is the subject of this post. Recall that supervised machine learning (ML) needs training data, what I earlier referred to as labeled data. It’s data where someone has identified the different types of data before feeding it into the AI system. Basically, that someone had to properly categorize the data; labeling each example as benign or malicious. Having good t ..read more
Visit website
Coronavirus-Themed Phishing Fears Largely Overblown, Researchers Say
Lastline Cyber Security Blog | Malware Research & Analysis
by John Love
4y ago
The post Coronavirus-Themed Phishing Fears Largely Overblown, Researchers Say appeared first on Lastline ..read more
Visit website
Morning Cybersecurity
Lastline Cyber Security Blog | Malware Research & Analysis
by John Love
4y ago
The post Morning Cybersecurity appeared first on Lastline ..read more
Visit website
5 Truths about AI in Cybersecurity – Truth #3: Good Training Data Can Be Hard to Get
Lastline Cyber Security Blog | Malware Research & Analysis
by Dr. Christopher Kruegel
4y ago
Truth #2 described how linear classifiers will result in lots of false positives and false negatives. More sophisticated data modeling is needed. And what is necessary for those models to be properly trained is data, lots of data! That is the subject of this post. Recall that supervised machine learning (ML) needs training data, what I earlier referred to as labeled data. It’s data where someone has identified the different types of data before feeding it into the AI system. Basically, that someone had to properly categorize the data; labeling each example as benign or malicious. Having good t ..read more
Visit website
Lastline Boosts SOC Efficiency by 100%, Effectively Doubling Productivity of SOC Teams
Lastline Cyber Security Blog | Malware Research & Analysis
by Lastline
4y ago
Lastline Defender adds SOC automation to the network threat detection and response platform, providing highly accurate threat protection and streamlined investigation SAN MATEO, CA, May 21, 2020- Lastline®, the leader in AI-powered network detection and response, today announced the Spring 2020 release of Lastline Defender, which delivers a significant security efficiency boost by increasing efficacy of threat detection. This dramatically reduces false positives and automates threat investigation based on hundreds of contextual data markers about hosts and users on the network. Lastline Defend ..read more
Visit website

Follow Lastline Cyber Security Blog | Malware Research & Analysis on FeedSpot

Continue with Google
Continue with Apple
OR