Cognitive Intelligence
Cognitive Intelligence: Empowering Security Analysts, Defeating Polymorphic Malware
5 min read
In psychology, the term “cognition” refers to a human function that is involved in gaining knowledge and intelligence. It helps describe how people process information and how the treatment...
Securing Encrypted Traffic on a Global Scale
7 min read
written by Martin Rehak and Blake Anderson, on behalf of Cognitive and ETA teams Introduction How many engineers does it take to find malware in encrypted traffic? In case of...
Are You The Lucky One? Sometimes Luck Can Bring You Malware
6 min read
For more than two decades, malicious actors have been evolving their Phishing techniques to effectively achieve their goals. From poorly crafted scams to extremely well crafted documents, Phishing attacks keep being a very effective...
The light is green! But is it safe to go? Abusing users’ faith in HTTPS
3 min read
This post was authored by Anna Shirokova and Ivan Nikolaev John Smith had a lot of friends and liked to travel. One day he got an email that read: "Money has been sent...
Closing One Learning Loop: Using Decision Forests to Detect Advanced Threats
6 min read
This blog post was authored by Veronica Valeros and Lukas Machlica Malicious actors are constantly evolving their techniques in order to evade detection. It is not only the sophistication or the rapid...
In plain sight: Credential and data stealing adware
7 min read
Adware has been around for a while now. In principle, displaying advertising in order to finance your software is not necessarily something bad. Users are used to seeing advertising everywhere: newspapers, magazines, and websites. When...
Piecing Together Malicious Behavior in Encrypted Traffic
9 min read
This post was authored by Jan Kohout, Veronica Valeros and Petr Somol. Increasing adoption of encryption in web communication significantly contributes to protection of users' privacy. However, it also brings...
Cognitive Threat Analytics: Turn Your Proxy Into Security Device
8 min read
This post was authored by Veronica Valeros, Petr Somol, Martin Rehak and Martin Grill, on behalf of the whole CTA team. Some of us still intuitively believe that our extensively...
Introducing executive dashboards in CTA
2 min read
No security risk assessment is complete without the executive summary section. Something that can answer the high level questions security teams get asked including “how secure are we?”, “what threats...
4