RSA Conference 2020—Empower your defenders with artificial intelligence and automation

Credit to Author: Todd VanderArk| Date: Tue, 04 Feb 2020 17:00:55 +0000

The RSA Conference 2020 kicks off in less than three weeks—here are a few highlights to help you plan your time.

The post RSA Conference 2020—Empower your defenders with artificial intelligence and automation appeared first on Microsoft Security.

Read more

Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks

Credit to Author: Eric Avena| Date: Wed, 18 Dec 2019 18:00:24 +0000

Microsoft Defender ATP data scientists and threat hunters collaborate to use a data science-driven approach to detecting RDP brute force attacks to protect customers against real-world threats.

The post Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks appeared first on Microsoft Security.

Read more

In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks

Credit to Author: Eric Avena| Date: Tue, 08 Oct 2019 15:00:11 +0000

Two new machine learning protection features within the behavioral blocking and containment capabilities in Microsoft Defender ATP specialize in detecting threats by analyzing behavior, adding new layers of protection after an attack has started running.

The post In hot pursuit of elusive threats: AI-driven behavior-based blocking stops attacks in their tracks appeared first on Microsoft Security.

Read more

From unstructured data to actionable intelligence: Using machine learning for threat intelligence

Credit to Author: Eric Avena| Date: Thu, 08 Aug 2019 16:30:12 +0000

Machine learning and natural language processing can automate the processing of unstructured text for insightful, actionable threat intelligence.

The post From unstructured data to actionable intelligence: Using machine learning for threat intelligence appeared first on Microsoft Security.

Read more

New machine learning model sifts through the good to unearth the bad in evasive malware

Credit to Author: Eric Avena| Date: Thu, 25 Jul 2019 16:30:55 +0000

Most machine learning models are trained on a mix of malicious and clean features. Attackers routinely try to throw these models off balance by stuffing clean features into malware. Monotonic models are resistant against adversarial attacks because they are trained differently: they only look for malicious features. The magic is this: Attackers can’t evade a monotonic model by adding clean features. To evade a monotonic model, an attacker would have to remove malicious features.

The post New machine learning model sifts through the good to unearth the bad in evasive malware appeared first on Microsoft Security.

Read more

Caution: Misuse of security tools can turn against you

Credit to Author: Vasilios Hioureas| Date: Thu, 11 Jul 2019 17:34:57 +0000

If not implemented correctly, the very security tools we use to keep our information private may actually cause data leaks themselves. We outline a few cases and provide suggestions for researchers and security admins.

Categories:

Tags:

(Read more…)

The post Caution: Misuse of security tools can turn against you appeared first on Malwarebytes Labs.

Read more