Ingest incoming binaries: extract and compute features, statistics, and abstractions from incoming binaries. Binaries come from customers, partners, and trawls of the web for the diverse goodware and malware samples. The output of this task is a series of predictions about binaries' potential maliciousness and relationships to known malware families. Intelligence comes from our partners, our customers, and Carbon Black malware analysts.
Aug-29-2016, 15:55:42 GMT