Seeing Malware Through the Eyes of a Convolutional Neural Network
Motivation Deep learning models have been considered “black boxes” in the past, due to the lack of interpretability they were presented with.…
Motivation Deep learning models have been considered “black boxes” in the past, due to the lack of interpretability they were presented with.…
In this blog, we present the results of some preliminary experiments with training highly “overfit” (interpolated) models to identify malicious activity based…
After more than a decade, the sun has set on Python 2. Love it or hate it, Python 2.7.18 is the final…
GuLoader, a malware family that emerged in the wild late last year, is written in Visual Basic 6 (VB6), which is just…
Over the past decade, remote work has been gradually shifting from a coveted perk to a popular arrangement, especially in the tech…
CrowdStrike® employees like to say that there is big data, huge data and our data. To date, we have collected, analyzed and…
How to effectively manage client-side partial failures, avoid data loss and process errors Apache Kafka is the gold standard for building real-time…
Python is one of the most popular programming languages for data scientists — and for good reason. The Python Package Index (PyPI)…
Maze ransomware is a recent addition to the ever-growing list of ransomware families. It stands out from the others by leveraging a…
Malware in the Scripting Landscape Scripting is a well-known means of spreading malware. Easy to write and often difficult for security solutions…