How and why do we attack our own Anti-Spam?
How to trick the machine-learning model in Anti-Spam designed to detect and quarantine suspicious e-mails, and how to detect such attacks. Continue reading How and why do we attack our own Anti-Spam?
Collaborate Disseminate
How to trick the machine-learning model in Anti-Spam designed to detect and quarantine suspicious e-mails, and how to detect such attacks. Continue reading How and why do we attack our own Anti-Spam?
Dan Demeter, Senior Security Researcher with Kaspersky’s Global Research and Analysis Team and head of Kaspersky’s Honeypot project, explains what honeypots are, why they’re recommended for catching external threats, and how you can set up your own simple SSH-honeypot. Continue reading Detecting unknown threats: a honeypot how-to
The detection logic has been improved in all our solutions to ensure our customers protection. We continue to investigate cyberattack on SolarWinds and we will add additional detection once they are required. Continue reading How we protect our users against the Sunburst backdoor
In pursuit of a high cyberthreat detection rate, the some developers of cybersecurity solutions neglect the subject matter of false positives, and unfairly so. Regretfully, only then does the idea dawn on these developers that high-quality protection from cyberthreats involves not only prevention but also a low false-positive rate. Continue reading False Positives: Why Vendors Should Lower Their Rates and How We Achieved the Best Results