Malspam in the Time of COVID-19
As the new coronavirus, COVID-19, spreads around the planet, many people are filled with emotions like fear, uncertainty and hope — which…
As the new coronavirus, COVID-19, spreads around the planet, many people are filled with emotions like fear, uncertainty and hope — which…
Machine learning for computer security has enjoyed a number of recent successes, but these tools aren’t perfect, and sometimes a novel family…
Working with text data (which we often refer to as “strings”) is common in cybersecurity applications. For example, suppose we have a…
Red team penetration testers very often add tools to their arsenal that borrow techniques originating in malicious software. Shellter is such a…
While adversaries continue to evolve their cyberattacks, CrowdStrike® scientists and engineers keep pushing the boundaries of what’s achievable in malware detection and…
Introduction Machine learning is one of the many tools we use at CrowdStrike® to stop breaches. To do it well, we need…
My last blog post discussed the rationale for CrowdScore® and outlined its evidence-weighting approach, demonstrating a 10- to 25-fold improvement in the…
Machine learning has demonstrated dramatic effectiveness in a wide range of fields, including computer security. However, machine learning for computer security has…
At CrowdStrike®, machine learning is a major tool for detecting new malware families and keeping our customers safe. We utilize gradient boosted…
One key building block we use for scaling our machine learning models at CrowdStrike® is Docker containers. Docker containers let us construct…