Extinction Level Event: Evolution of the Sandbox

Posted by John Bradshaw, Vice President, Worldwide Sales Engineering, Lastline on 4/17/15 11:08 AM

Moore's LawAn Extinction Level Event occurs when something rapid and cataclysmic happens upsetting the natural order of things to such a degree that species are not able to adapt quick enough and die off in rapid fashion. In the natural world, these events are rare with only five major extinction events recorded in Earth’s history – and some scientists claim we are now in a sixth major extinction event. However, the cyber world is evolving at a much faster pace. Moore’s Law describes the exponential rate of computing power and how it increases every two years. Right along with these increases in sheer computing power have come advances in both information security capabilities and methodologies used by advanced threat groups to thwart those gains. In technology we expect rapid extinction cycles — and we are on the verge of witnessing another cyber security extinction level event now.

Read More

Topics: Malware Sandboxing Analysis, Full-system Emulation

Verizon's 2015 DBIR Featuring Lastline Data is Out!

Posted by Ashley Kiolbasa on 4/14/15 1:30 PM

Verizon’s annual Data Breach Investigations Report (DBIR), has become one of the most anticipated information security industry reports of the year. Now in its eleventh year, the 2015 DBIR continues the tradition of analyzing threats and vulnerabilities that lead to some of the largest security incidents of the past year and quantifying the impact on those organizations affected. 

images-4Verizon's security researchers compiled data from nearly 80,000 security incidents and more than 2,000 data compromises from 61 countries. Contributions from several forensics firms, government agencies, and security researchers, including Lastline Labs, help to provide detailed findings on 2014 incident and make this one of the most collaborative, data-driven information security reports available.  

Lastline is honored to be included in this comprehensive report that helps to drive continuous action and improvement throughout the entire security community year after year. 

You can download the full 2015 Verizon Data Breach Investigations Report here

Read More

Topics: DBIR, 2015 Data Breach Investigations Report, Verizon, Lastline Labs

You Are The Weakest Link – Goodbye!

Posted by John Bradshaw, Vice President, Worldwide Sales Engineering, Lastline on 4/7/15 7:00 AM

I am sure everyone remembers the TV Game Show, The Weakest Link, where host Anne Robinson in the end would notify the team member who answered the most questions incorrectly during the round that they were “The Weakest Link – Goodbye!” and repeat the process until there was a winner.

As security practitioners, we must constantly assess where our weakest links are within our operational workflow. This is a continuous evaluation, and designating a weakest link only means you have identified an area that currently requires more focus and refinement to get the best possible results.

Read More

Topics: SOC Analyst, CISO

Lastline Named a Finalist for SC Magazine 2015 Awards Europe

Posted by Matthew Baker on 3/24/15 11:00 AM

11th Annual 2015 Info Security's Global Excellence AwardsTop information security research and business information site SC Magazine has recognized Lastline as a finalist for its 2015 SC Magazine Awards Europe.

Category: Best Advanced Persistent Threat (APT) Protection

As part of the IT security industry's leading global awards program, SC Awards Europe was organized to honor the professionals, companies and products that help fend off the myriad security threats confronted in today's corporate world. 

These prestigious, highly-competitive awards recognize security and IT vendors with advanced, ground-breaking products and solutions that are helping set the bar higher for others in all areas of security and technologies. We are honored to be nominated.

Stay tuned to this blog for more, as winners will be announced June 2nd! 

Read More

Topics: Lastline News, Awards

Kernel Rootkit Analysis with Lastline Breach Detection Platform 6.5

Posted by Brian Laing on 3/17/15 10:00 AM

Today at SXSW Interactive, Lastline co-founder and chief architect Engin Kirda presented new insights into malware in the wild including new research coming out of Lastline Labs on high resolution dynamic analysis of Windows kernel rootkits. We also announced today a new analysis capability in the 6.5 release of the Lastline Breach Detection Platform that provides unprecedented insights into this pernicious type of malware hidden in the kernel of Microsoft Windows operating systems.

Read More

Topics: Malware Sandboxing Analysis, Lastline Breach Detection Platform, Kernel Rootkit Analysis

Gartner Video: A New Generation of Sandboxing for the Next Generation of Threats

Posted by Freddy Mangum on 3/10/15 8:00 AM

The cyber threat landscape is dramatically changing, but one thing is certain – malware authors are becoming increasingly sophisticated, and most organizations are struggling to keep pace.

Read More

Topics: Evasive Malware, Lastline Breach Detection Platform, Gartner, Sandboxing

Lastline Named a Finalist for Four Info Security Products Guide Global Excellence Awards

Posted by Matthew Baker on 2/26/15 10:00 AM

11th Annual 2015 Info Security's Global Excellence AwardsWith RSA right around the corner, globally distributed security professionals prepare their annual migration to San Francisco. Once again, parties are being planned, presentations prepared and planners packed — it's an industry tradition. Hand-in-hand with RSA is award season and the respected research and advisory site, Info Security Products Guide, has just announced their list of finalists for its 11th Annual 2015 Global Excellence Awards. These highly-competitive and prestigious global awards recognize achievements for outstanding industry products and services.

Read More

Topics: Lastline News, Awards, RSA 2015

Bit9 + Carbon Black Partners and Integrates with Lastline to Deliver End-to-End Network and Endpoint Security

Posted by Brian Laing on 2/3/15 10:00 AM

Bit9® + Carbon Black®, the leader in endpoint threat prevention, detection and response, has partnered and integrated with Lastline. By combining the Lastline Breach Detection Platform with endpoint security from Bit9 + Carbon Black using our APIs, we can now jointly deliver end-to-end endpoint and network security for email, web, files and mobile applications. With this joint solution in place, enterprises will gain faster and more comprehensive visibility into indicators of compromise and malware behaviors on endpoints such as laptops or desktops. IT security professionals are thus better equipped to handle incident response and prevent data leakage.

Read the full press release


Read More

Topics: Partnership, Integration, Bit9 + Carbon Black, End-to-End Protection

Dell SecureWorks Combines Its Threat Intelligence with Lastline Breach Detection Platform to Launch Advanced Malware Protection and Defense (AMPD) Service

Posted by Brian Laing on 1/26/15 6:00 AM


Dell SecureWorks is combining its threat intelligence with the Lastline Breach Detection Platform to bring to market its Advanced Malware Protection and Detection (AMPD) service. With AMPD, the Dell SecureWorks Counter Threat Unit research team can rapidly diagnose and manage advanced threats. The software-based Lastline Breach Detection Platform combines with Dell SecureWorks threat intelligence to deliver better, faster breach detection and incident response with correlated, prioritized threat analysis.

Read More

Topics: Partners, Advanced Malware Protection and Detection, AMPD, Dell SecureWorks

Lastline Breach Detection Platform for Virtual Desktop Infrastructure

Posted by Freddy Mangum on 12/15/14 8:00 AM

How does Virtual Desktop Infrastructure (VDI) deployment affect the information security of your organization? Will all the nightmare security scenarios disappear since VDI instances can be easily refreshed with a baseline image?

Read More

Topics: Lastline Breach Detection Platform, Virtual Desktop Infrastructure

Subscribe to Email Updates