Hunting Malicious Certificates with Deep Learning

Seeing the signature green padlock and “https” in the browser bar means one thing for most internet users: safety. However, is this sense of security justified?  The short answer is a loud, resounding, no! To start, let’s define what “https” really means: that the website being accessed is encrypted, and all information sent through the site is protected by... Continue Reading →

DeepPhish: Simulating malicious AI

Recently we presented a research paper on the malicious usage of AI by cyber attackers. Here the abstract, slides a link to the paper. Machine Learning and Artificial Intelligence have become essential to any effective cyber security and defense strategy against unknown attacks. In the battle against cybercriminals, AI-enhanced detection systems are markedly more accurate... Continue Reading →

Machine Learning Explained

Machine learning models are often dismissed on the grounds of lack of interpretability. There is a popular story about modern algorithms that goes as follows: Simple linear statistical models such as logistic regression yield to interpretable models. On the other hand, advanced models such as random forest or deep neural networks are black boxes, meaning... Continue Reading →

Phishing Attack Analysis: Estimating Key Cluster Features and Why It’s Important

First, let’s quickly review the clusters we built to understand phishing attacks. Using data we collected over the course of a year spent tracking and taking down phishing cases for a major U.S. financial institution, we extracted features from four categories: similarity analysis, structure analysis, phishing visitors tracking and domain registration. Then, using the expectation-maximization... Continue Reading →

Clustering of Phishing Attacks

In a recent report we showed how we are able to gain better understanding of phishing attacks and attackers by using cluster analysis. This post lays out in greater detail how to create those clusters by examining the features and methods used.For the study, we used the data collected over the course of more than a year... Continue Reading →

Up ↑