New browser extensions for integrating Microsoft’s hardware-based isolation

Read more New browser extensions for integrating Microsoft’s hardware-based isolation

Windows Defender Antivirus can now run in a sandbox

Read more Windows Defender Antivirus can now run in a sandbox

Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV

Read more Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV

Office VBA + AMSI: Parting the veil on malicious macros

Read more Office VBA + AMSI: Parting the veil on malicious macros

Protecting the protector: Hardening machine learning defenses against adversarial attacks

Read more Protecting the protector: Hardening machine learning defenses against adversarial attacks

Protecting the modern workplace from a wide range of undesirable software

Read more Protecting the modern workplace from a wide range of undesirable software

Attack inception: Compromised supply chain within a supply chain poses new risks

Read more Attack inception: Compromised supply chain within a supply chain poses new risks

March-April 2018 test results: More insights into industry AV tests

Read more March-April 2018 test results: More insights into industry AV tests

Taking apart a double zero-day sample discovered in joint hunt with ESET

Read more Taking apart a double zero-day sample discovered in joint hunt with ESET

Machine learning vs. social engineering

Read more Machine learning vs. social engineering