Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @jason_trost
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jason_trost
-
Jason Trost proslijedio/la je Tweet
v0.2 of my security learning model thanks to feedback from
@eugk@taosecurity and@jacnah63. It's part of what makes security so exhilarating that many conversations (e.g. strategy around designing a threat response operation) require every layer as part of the conversation.pic.twitter.com/bDuT0Znx2t
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
There is a new AI, ML, & Data Science track for
@BlackHatEvents USA this year. If you are doing offensive ML research, we want to see it! https://www.blackhat.com/us-20/tracks.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
1/ Some thoughts on the way ML gets talked about in security: Most security problems are not machine learning problems. Like encryption, dual-factor authentication, taint analysis, or hand-crafted IOCs, machine learning is just one of many security tools.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
Heterogeneous Information Networks and Applications to Cyber Security https://link.medium.com/uqrZyZAwp3 pic.twitter.com/OV69oLUEFv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
3 Short Links on Popular Domain Lists for Threat Intelligencehttps://link.medium.com/n2xwQYfZL3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
6 Short Links on Malware Training Set Creation for Machine Learninghttps://link.medium.com/3gc6dt8uM3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Collecting and Curating IOC Whitelists for Threat Intelligence and Machine Learning Researchhttps://link.medium.com/VYxwVcIjM3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
Facial Recognition meets malware clustering: training on family names plus some embedding tricks stolen from the FR literature plus TSNE leads to super sharp clusters, with a few cases of potential mislabeling to dig into (check out the potential FNs southeast of the origin)!pic.twitter.com/HEE6MltlBr
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
What % of malware uses non-TLS vs TLS for C2? Based on a (super biased) sample of ~10k binaries over 10 years I estimate it’s 90/10. Would love to see someone do a broader, less biased eval to see if it is on the rise (I don’t think it is)pic.twitter.com/2qbJF8Frjj
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
.
@SpecterOps recently decommissioned their Adversary Tactics:#PowerShell course, and rather than let it collect dust, they offered it up to the community for free in the spirit of their commitment to transparency. https://github.com/specterops/at-ps …#ThankYou#DFIR#BlueTeam#RedTeamHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
1\ Surprisingly, you could build a very mediocre PE malware detector with a single PE feature: the PE compile timestamp. In fact, I built a little random forest detector that uses only the timestamp as its feature that gets 62% detection on previously unseen malware at a 1% FPR.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Robustness of AI Systems Against Adversarial Attackshttps://sites.google.com/view/raisa3-2020 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
OSINT thread inbound. I did this all on my phone from the dog park. This ones for
@AccidentalCISO Starting with nothing, this is the pic. Going for an explicit pin, not just the "location". Let's build some data points. First - Identifiable landmarks, front to back 1/xhttps://twitter.com/The4rchangel/status/1221535670977683464 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
1\ Let's bypass a convolutional neural network trained to recognize previously unseen bad URLs. The classifier gives a score between 0 (benign) and 1 (definitely malicious). I start by making up a phishing URL: hxxp://wellsfargo-customer-support.webhosting.pl/login
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
1/ Here's a thread on how to build the kind of security artifact "social network" graph popularized by
@virustotal and others, but customized, and on your own private security data. Consider the following graph, where the nodes are malware samples:pic.twitter.com/k7DsdBxJGb
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
Debugging deep learning models can be really tricky and frustrating, especially in the security space where a lot of the time you're not sure about ground truth labels, but here's a thread with some tricks I've picked up. Add your own if you've got them! 1/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeadPrint: Detecting Anomalous Communications through Header-based Application Fingerprinting https://www.conand.me/publications/bortolameotti-headprint-2020.pdf …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:https://github.com/ddz/whatsapp-media-decrypt …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
Checkout the latest revision: https://arxiv.org/abs/1905.06262 https://twitter.com/joshua_saxe/status/1220446281509875712 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Trost proslijedio/la je Tweet
@fel_d presenting very thorough and original work on inferring descriptions of malware samples' purposes, via a deep neural net.@CamlisOrg. Work done jointly with@EthanMRudd,@AlexMasonLong,@Xodarap, and@kberlin@Sophos AI.https://www.youtube.com/watch?v=q1axkVsm0_c …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.