Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction
January 21 2021Highlights Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect ...
Read moreHighlights Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect ...
Read moreHighlights Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect ...
Read moreIn August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreIn August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreIn December 2020, FireEye uncovered and publicly disclosed a widespread attacker campaign that is being tracked as UNC2452. In some, but not all, of the intrusions associated...
Read moreIn December 2020, FireEye uncovered and publicly disclosed a widespread attacker campaign that is being tracked as UNC2452. In some, but not all, of the intrusions associated...
Read moreFireEye has discovered additional details about the SUNBURST backdoor since our initial publication on Dec. 13, 2020. Before diving into the technical depth of this malware, we...
Read moreFireEye has discovered additional details about the SUNBURST backdoor since our initial publication on Dec. 13, 2020. Before diving into the technical depth of this malware, we...
Read moreFireEye has discovered additional details about the SUNBURST backdoor since our initial publication on Dec. 13, 2020. Before diving into the technical depth of this malware, we...
Read moreExecutive Summary We have discovered a global intrusion campaign. We are tracking the actors behind this campaign as UNC2452. FireEye discovered a...
Read more
Recent Comments