You’ve used them for directions, to order pizza, to ask about the weather. You’ve called them by their names Siri, Alexa, Cortana... You speak to them like you know them, like they can understand you. Why? Because they usually can. Intelligent assistants are on the rise and increasingly supporting our lives. In large part, this is driven by the user’s desire for ever more efficient querying and frictionless action. Instead of muddling through bloated interfaces, simply speaking or typing your queries or commands through a bot is often easier, faster, and seamless.
January 17, 2017
Dude! Where's my Ransomware?: A Flare-On Challenge
There are many tricks to the tradecraft when analyzing unknown binaries, and it requires constant honing of skills to stay on top of the latest malware and campaigns. Solving reverse-engineering challenges is one way to keep your skills sharp. In our previous post, we discussed some tips from the Flare-On Challenge.
On December 29, 2016, the United States Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a joint analysis report (JAR) detailing, in their words, “tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities”.
Long Short-Term Memory networks - a form of deep learning - are a basic yet powerful approach for detecting domain generation algorithms. We introduce this machine learning approach and how we implement it to detect DGAs at scale.
November 09, 2016
0 to 31337 Real Quick: Lessons Learned by Reversing the FLARE-On Challenge
At this year's AISec conference, data scientist Bobby Filar presented co-authored work titled DeepDGA: Adversarially-Tuned Domain Generation and Detection. It was quickly evident that more conferences which focus on the intersection of machine learning and infosec are desperately needed.
Digital masquerading is used by the most sophisticated as well as less skilled adversaries to hide in the noise while conducting operations. We continue our how to hunt series with an exploration of masquerading.
October 25, 2016
Protecting the Financial Sector: Early Detection of Trojan.Odinaff