Rise of Legitimate Services for Backdoor Command and Control | Anomali

Rise of Legitimate Services for Backdoor Command and Control | Anomali

Threat Hunting at Scale: Tools & Techniques to Mature Your Program

Threat Hunting at Scale: Tools & Techniques to Mature Your Program

A comprehensive survey on machine learning for networking: evolution

A comprehensive survey on machine learning for networking: evolution

GitHub Archives - Code, Security and Server Stuff

GitHub Archives - Code, Security and Server Stuff

How to Secure GitHub with Automated Threat Detection

How to Secure GitHub with Automated Threat Detection

How to use Amazon GuardDuty and AWS Web Application Firewall to

How to use Amazon GuardDuty and AWS Web Application Firewall to

Git vs  GitHub – Why IT pros should know the difference – 4sysops

Git vs GitHub – Why IT pros should know the difference – 4sysops

GitHub Archives - Code, Security and Server Stuff

GitHub Archives - Code, Security and Server Stuff

Arxiv Sanity Preserver

Arxiv Sanity Preserver

A National Initiative on AI Skilling and Research

A National Initiative on AI Skilling and Research

Unsupervised learning for anomaly detection in stock options pricing

Unsupervised learning for anomaly detection in stock options pricing

An Introduction to Anomaly Detection in R with Exploratory

An Introduction to Anomaly Detection in R with Exploratory

North Korea Turns Against New Targets?! - Check Point Research

North Korea Turns Against New Targets?! - Check Point Research

Trocker

Trocker

Threat Model ATT&CK - NSFOCUS, Inc , a global network and cyber

Threat Model ATT&CK - NSFOCUS, Inc , a global network and cyber

PDF) Coding Together at Scale: GitHub as a Collaborative Social Network

PDF) Coding Together at Scale: GitHub as a Collaborative Social Network

Attackers Wiping GitHub and GitLab Repos, Leave Ransom Notes

Attackers Wiping GitHub and GitLab Repos, Leave Ransom Notes

Analyzing Microsoft ATA

Analyzing Microsoft ATA

Test-Driven Data Analysis

Test-Driven Data Analysis

iDev: Enhancing Social Coding Security by Cross-platform User

iDev: Enhancing Social Coding Security by Cross-platform User

Florian Roth on Twitter:

Florian Roth on Twitter: "Wrote a #Sigma rule for #BabyShark malware

securetea · PyPI

securetea · PyPI

GitHub - stamparm/maltrail: Malicious traffic detection system

GitHub - stamparm/maltrail: Malicious traffic detection system

Which machine learning techniques have you used for fraud detection

Which machine learning techniques have you used for fraud detection

New Slack and GitHub Backdoor Malware Evades AntiVirus Detection

New Slack and GitHub Backdoor Malware Evades AntiVirus Detection

Audit logging in Bitbucket Server - Atlassian Documentation

Audit logging in Bitbucket Server - Atlassian Documentation

New Phishing Scam uses AES Encryption and Goes After Apple IDs

New Phishing Scam uses AES Encryption and Goes After Apple IDs

Implementing a CNN for Human Activity Recognition in Tensorflow

Implementing a CNN for Human Activity Recognition in Tensorflow

Detecting Malicious Urls with Machine Learning In Python

Detecting Malicious Urls with Machine Learning In Python

The Growing Trend of Coin Miner JavaScript Infection

The Growing Trend of Coin Miner JavaScript Infection

Deep Learning Models for Human Activity Recognition

Deep Learning Models for Human Activity Recognition

Video Analysis to Detect Suspicious Activity Based on Deep Learning

Video Analysis to Detect Suspicious Activity Based on Deep Learning

Detect Suspicious Code Commits | JupiterOne | Simplified Security

Detect Suspicious Code Commits | JupiterOne | Simplified Security

Fraud detection in retail - Linkurious

Fraud detection in retail - Linkurious

Memory Leak Patterns in Android - AndroidPub

Memory Leak Patterns in Android - AndroidPub

Kubernetes security for Google Cloud Security Command Center  | Sysdig

Kubernetes security for Google Cloud Security Command Center | Sysdig

Anyone else getting these spam emails from github? : github

Anyone else getting these spam emails from github? : github

AI in Finance: Moving forward!

AI in Finance: Moving forward!

Human Activity Recognition Github Python

Human Activity Recognition Github Python

How to Use DNS Analytics to Find the Compromised Domain in a Billion

How to Use DNS Analytics to Find the Compromised Domain in a Billion

PowerShell Injection with Fileless Payload Persistence and Bypass

PowerShell Injection with Fileless Payload Persistence and Bypass

Five video classification methods implemented in Keras and TensorFlow

Five video classification methods implemented in Keras and TensorFlow

TLS beaconing detection using ee-outliers and Elasticsearch – NVISO Labs

TLS beaconing detection using ee-outliers and Elasticsearch – NVISO Labs

Understanding the Next Generation of Security Technologies | Mythics

Understanding the Next Generation of Security Technologies | Mythics

Detect Suspicious Code Commits in Pull Requests — JupiterOne

Detect Suspicious Code Commits in Pull Requests — JupiterOne

An Introduction to Anomaly Detection in R with Exploratory

An Introduction to Anomaly Detection in R with Exploratory

New Slack and GitHub Backdoor Malware Evades AntiVirus Detection

New Slack and GitHub Backdoor Malware Evades AntiVirus Detection

An Investigation into Real-time Fraud Detection in the

An Investigation into Real-time Fraud Detection in the

Android Developers Blog: Google Play game services ends year with a

Android Developers Blog: Google Play game services ends year with a

Attackers Wiping GitHub and GitLab Repos, Leave Ransom Notes

Attackers Wiping GitHub and GitLab Repos, Leave Ransom Notes

Practical Machine Learning for Cloud Intrusion Detection

Practical Machine Learning for Cloud Intrusion Detection

GitHub Hosts Infostealers Part 2: Cryptominers and Credit Card Stealers

GitHub Hosts Infostealers Part 2: Cryptominers and Credit Card Stealers

SALVAGE D2 2 Description of the developed algorithms for intrusion

SALVAGE D2 2 Description of the developed algorithms for intrusion

OWASP Top 10 Vulnerabilities & ASP NET

OWASP Top 10 Vulnerabilities & ASP NET

Kubernetes security for Google Cloud Security Command Center  | Sysdig

Kubernetes security for Google Cloud Security Command Center | Sysdig

arXiv:1901 03407v2 [cs LG] 23 Jan 2019

arXiv:1901 03407v2 [cs LG] 23 Jan 2019

GreyWizard - How to create a web application firewall using machine

GreyWizard - How to create a web application firewall using machine

Nextron Systems on Twitter:

Nextron Systems on Twitter: "We got a silent alert from our VTI YARA

Security crawl walk run presentation mckay v1 2017

Security crawl walk run presentation mckay v1 2017

Curating GitHub for engineered software projects | Nuthan Munaiah

Curating GitHub for engineered software projects | Nuthan Munaiah

My open source Instagram bot got me 2,500 real followers for $5 in

My open source Instagram bot got me 2,500 real followers for $5 in

Malicious code found in npm package event-stream downloaded 8

Malicious code found in npm package event-stream downloaded 8

weihongli / Starred · GitHub

weihongli / Starred · GitHub

Detecting Compressed RTF - SANS Internet Storm Center

Detecting Compressed RTF - SANS Internet Storm Center

Detecting objects in videos and camera feeds using Keras, OpenCV

Detecting objects in videos and camera feeds using Keras, OpenCV

Splunk and Tensorflow for Security: Catching the Fraudster with

Splunk and Tensorflow for Security: Catching the Fraudster with

Detecting Malicious Use of  NET – Part 2 | Countercept

Detecting Malicious Use of NET – Part 2 | Countercept

arXiv:1901 03407v2 [cs LG] 23 Jan 2019

arXiv:1901 03407v2 [cs LG] 23 Jan 2019

OWASP AppSensor Project - OWASP

OWASP AppSensor Project - OWASP

Identifying unusual commits on GitHub - Semantic Scholar

Identifying unusual commits on GitHub - Semantic Scholar

Alerting and Detection Strategy Framework - Palantir Blog - Medium

Alerting and Detection Strategy Framework - Palantir Blog - Medium

The Supreme Backdoor Factory - dfir it!

The Supreme Backdoor Factory - dfir it!

Evaluating Convolutional Neural Network for Effective Mobile Malware

Evaluating Convolutional Neural Network for Effective Mobile Malware

Intelligent Surveillance as an Edge Network Service: from Harr

Intelligent Surveillance as an Edge Network Service: from Harr

elastalert tagged Tweets and Download Twitter MP4 Videos | Twitur

elastalert tagged Tweets and Download Twitter MP4 Videos | Twitur

A Chinese School is Using Facial Recognition to Analyze Students

A Chinese School is Using Facial Recognition to Analyze Students

Matthias Groncki | Jupyter notebooks – a Swiss Army Knife for Quants

Matthias Groncki | Jupyter notebooks – a Swiss Army Knife for Quants

Memory Leak Patterns in Android - AndroidPub

Memory Leak Patterns in Android - AndroidPub

Basic motion detection and tracking with Python and OpenCV

Basic motion detection and tracking with Python and OpenCV

Splunk and Tensorflow for Security: Catching the Fraudster with

Splunk and Tensorflow for Security: Catching the Fraudster with

A National Initiative on AI Skilling and Research

A National Initiative on AI Skilling and Research

Datasets of the Week, April 2017: Fraud Detection, Exoplanets

Datasets of the Week, April 2017: Fraud Detection, Exoplanets

Fraud Detection Using Autoencoders in Keras with a TensorFlow Backend

Fraud Detection Using Autoencoders in Keras with a TensorFlow Backend

News from the Lab

News from the Lab

Eye in the Sky' is a Machine Learning Project that Detects Violent

Eye in the Sky' is a Machine Learning Project that Detects Violent

NeuroBlast: ActiveState's TensorFlow Powered Game Now Available on

NeuroBlast: ActiveState's TensorFlow Powered Game Now Available on

Analyzing Microsoft ATA

Analyzing Microsoft ATA

Bypassing Memory Scanners with Cobalt Strike and Gargoyle

Bypassing Memory Scanners with Cobalt Strike and Gargoyle

github com-sbilly-awesome-security_-_2017-04-20_00-01-06 : sbilly

github com-sbilly-awesome-security_-_2017-04-20_00-01-06 : sbilly

DNIF & Freshdesk Integration | DNIF

DNIF & Freshdesk Integration | DNIF

Implementing a CNN for Human Activity Recognition in Tensorflow

Implementing a CNN for Human Activity Recognition in Tensorflow

Reducing Risk of Credential Compromise @Netflix

Reducing Risk of Credential Compromise @Netflix

Unsupervised learning for anomaly detection in stock options pricing

Unsupervised learning for anomaly detection in stock options pricing

YARA Archives - Nextron Systems

YARA Archives - Nextron Systems

THREAT HUNTING FOR NON-HUNTERS – Mike Art Rebultan

THREAT HUNTING FOR NON-HUNTERS – Mike Art Rebultan

PDF) Curating GitHub for engineered software projects

PDF) Curating GitHub for engineered software projects

Best of Machine Learning: Reddit Edition - Heartbeat

Best of Machine Learning: Reddit Edition - Heartbeat

A National Initiative on AI Skilling and Research

A National Initiative on AI Skilling and Research

Unsupervised learning for anomaly detection in stock options pricing

Unsupervised learning for anomaly detection in stock options pricing

Basic motion detection and tracking with Python and OpenCV

Basic motion detection and tracking with Python and OpenCV