Ever seen a movie adaptation of a cybersecurity glossary? I did recently, to my surprise. The South Korean film On the Line (original title: Boiseu; lit. Voice, and no, it’s not the movie with the same name starring Mel Gibson) is undoubtedly an action movie. At the same time, it contains such a concentration of cybercrime that you could almost recommend it as a textbook on … [Read more...] about “On the Line”, a cybercrime movie
line
Best Practices for Navigating the Security Poverty Line
InfoSec, like any other aspect of IT, is a matter of three factors coming together: people, process and technology. All of these factors cost time and money in some way.The truth is, there are very few organizations out there who can supply their own security programs, staff, technology, processes and everything needed for InfoSec to an efficient degree. Everyone has to … [Read more...] about Best Practices for Navigating the Security Poverty Line
New Approach for Command Line Anomaly Detection
Suspicious command lines differ from common ones in how the executable path looks and the unusual arguments passed to them Bidirectional Encoder Representations from Transformers (BERT) embeddings can successfully be used for feature extraction for command lines Outlier detectors on top of BERT embeddings can detect anomalous command lines without the need for data labeling Our … [Read more...] about New Approach for Command Line Anomaly Detection