Don't get caught up in the "Smoke and Mirrors" of Cybersecurity
Don't get caught up in the "Smoke and Mirrors" of Cybersecurity Detection

Don't get caught up in the "Smoke and Mirrors" of Cybersecurity

Most of the cybersecurity industry uses A.I. heuristic and pattern matching algorithms to detect polymorphic malware. These are probabilistic algorithms, and they suffer from two serious short-comings.

  1. suffer from an over-abundance of “false positives”, and
  2. require that the malware they are using as their “basis” has been previously seen and identified, that is, they cannot detect any malware that is really new and innovative.

Crytica does not suffer from any of these short-comings. By detecting unauthorized changes to a device’s instruction set, Crytica’s algorithms are:

  • deterministic, not probabilistic … hence no false positives,
  • not reliant upon previous seen/identified malware … hence it can detect malware that is truly new and innovative,
  • able to detect polymorphic malware, since the malware’s “shape” is not an element in Crytica’s detection algorithm.

Crytica has a unique ability to reliably detect polymorphic malware. Polymorphic malware is malware that, on its own, changes its “shape”. These changes can be:

  • time dependent, i.e., after a specific period of time, the virus replicates itself, but with a different shape, or?
  • location dependent, i.e., when a virus changes its location, as when it propagates itself from device to device, the propagated version has a different shape.

The “shape” of a virus can be:

  • its virus signature, i.e., what virus program looks like, the “ones-and-zeros” that comprise its instruction set, and,
  • its attack vectors, i.e., how the virus acts, both when it propagates itself and when it launches.

By: Dr. C. Kerry Nemovicher, Ph.D. -?CEO of Crytica Security

#cybersecurity #cyberattack #malwaredetection #malwareprotection #mdr #edr #xdr #mssp #msp #virusdetection #ransomware #firewall

要查看或添加评论,请登录

Crytica Security的更多文章

社区洞察

其他会员也浏览了