New Threat Alert: Krane Malware
One of our honeypots has recently captured an interesting attack that we have not seen before. In this article, we will go through the peculiarities of…
One of our honeypots has recently captured an interesting attack that we have not seen before. In this article, we will go through the peculiarities of…
This is the second episode in the Honeypot Journals series, where we report our most recent findings from our honeynet logs. This time, we...
On the 27th of August, we have found evidence that an IoT device in one of our customer environments had accessed a malicious software sample. We…
Android is a very popular mobile operating system, running on around 50 percent of all mobile devices globally and around 40 percent in North America. The…
If you look at a digital attack map, you might think it is impossible for these cyber incursions to happen so rapidly. Thankfully, CUJO AI Labs…
The IoT Malware Journals series will cover the IoT threat landscape from a technical perspective. For this first article in the series, I will analyze the…
Recently, we have observed ongoing attacks on residential gateways. These attacks had a common trait: they all originated...
Attackers are always at the forefront of inventing new techniques to stay covert. It comes by no surprise that their tradecraft is also subject to continuous…
When it comes to IoT attacks and malware, there is a perceptible pattern in which most intrusions manifest. It is good practice to study such...