How ransomware attacks

Credit to Author: John E Dunn| Date: Fri, 15 Nov 2019 14:23:41 +0000

A new report reveals what defenders should know about the most prevalent and persistent malware families.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/PHgUHbe0Xgc” height=”1″ width=”1″ alt=””/>

Read more

New machine learning model sifts through the good to unearth the bad in evasive malware

Credit to Author: Eric Avena| Date: Thu, 25 Jul 2019 16:30:55 +0000

Most machine learning models are trained on a mix of malicious and clean features. Attackers routinely try to throw these models off balance by stuffing clean features into malware. Monotonic models are resistant against adversarial attacks because they are trained differently: they only look for malicious features. The magic is this: Attackers can’t evade a monotonic model by adding clean features. To evade a monotonic model, an attacker would have to remove malicious features.

The post New machine learning model sifts through the good to unearth the bad in evasive malware appeared first on Microsoft Security.

Read more