Comment by mike_hearn
24 days ago
The problem is what counts as suspicious. StepSecurity are quite clear in their post that they decide what counts as anomalous by comparing lots of open source runs against prior data, so they can't figure it out on their own.
No comments yet
Contribute on Hacker News ↗