In pursuit of the unknown: how an ML model learned to detect malware
Hello everyone! This is Ksenia Naumova. At Positive Technologies, I research malicious network traffic and improve tools for analyzing it at the security expert center.…
Hello everyone! This is Ksenia Naumova. At Positive Technologies, I research malicious network traffic and improve tools for analyzing it at the security expert center.…
Imagine having to replace an airplane engine mid-flight. That’s roughly the situation we found ourselves in when we took on the localization of production systems at…
Japanese cybersecurity provider Trend Micro has reported that since the end of 2024, it has been observing a wave of large-scale DDoS attacks utilizing "armies" of compromised…
In the spring of 2022, our team faced an unconventional task: we had to transfer the entire IT infrastructure of a large manufacturing enterprise from foreign management…
tl;dr - new computers sometimes have a rather fast network hidden, most likely not set up in your home.
We will start a series of articles called Detection is easy, dedicated to Detection engineering, which I write about in the Telegram channel of the same name.
dumbproxy was already mentioned on tekkix in one of my previous articles. It is an HTTP proxy server that works over TLS, directly compatible with browsers and browser…