Preventing Attacks that Bypass Detection-Based Cybersecurity Solutions