Closing One Learning Loop: Using Decision Forests to Detect Advanced Threats
6 min read
This blog post was authored by Veronica Valeros and Lukas Machlica Malicious actors are constantly evolving their techniques in order to evade detection. It is not only the sophistication or the rapid...
In plain sight: Credential and data stealing adware
7 min read
Adware has been around for a while now. In principle, displaying advertising in order to finance your software is not necessarily something bad. Users are used to seeing advertising everywhere: newspapers, magazines, and websites. When...
Cognitive Threat Analytics: Turn Your Proxy Into Security Device
8 min read
This post was authored by Veronica Valeros, Petr Somol, Martin Rehak and Martin Grill, on behalf of the whole CTA team. Some of us still intuitively believe that our extensively...