Since zero-day phishing and malware campaigns are just so hard to recognize, a solution depends on drawing on experience with past threats. One such method for detecting similarities between new files ...