Which 5 IoT Devices Are Attacked Most Often?
According to our device intelligence data, IoT devices make up around 33% of all devices connected to consumer home networks. These devices are infamous for their…
Device Intelligence Lab, Advanced Content Controls Lab, Security Research Lab and Vulnerability Research Lab – together CUJO AI Labs work on creating innovations to improve digital life security.
According to our device intelligence data, IoT devices make up around 33% of all devices connected to consumer home networks. These devices are infamous for their…
As evidenced by our latest annual cybersecurity report, network-attached storage (NAS) devices attract an outsized number of attacks. An average NAS device is targeted hundreds of…
CUJO AI Labs have just released a new cybersecurity report. Download it now! CUJO AI Sentry stopped 2,102,990,310 threats between May 1 and November 1, 2022,…
This article is a deep dive into how scammers drain the NFT wallets of unsuspecting victims. In this case, we identified a seller of a scam…
Our increasing reliance on AI systems may present an expanding attack surface to motivated adversaries. To proactively drive awareness of this issue, CUJO AI partnered with…
This is an overview of the current botnet activity, device and web browsing threat landscapes. It is based on real-world data from CUJO AI’s extensive coverage…
HMI Pwning 1 HMI Pwning 2 HMI Pwning 3 HMI Pwning 4 HMI Pwning 5 The Golden DNS Part 1 The Golden DNS Part 2 The…
Earlier this year, CUJO AI announced that its coverage reached more than 1 billion connected devices. This scale gives us a unique insight into the IoT…
A few weeks ago, Ivar Beljaars, our VP of Sales and Business Development, discussed why growth-oriented telecom operators invest in AI to deliver new Value-Added Services (VAS).…
FIRST CTF 2020 included a reversing track that consisted of 6+1 questions related to the field of reverse engineering. Break the Snake A small Python BreakMe…
The FIRST CTF 2020 included a crypto track that consisted of 7 questions related to different cryptography challenges. Decode This WW91ciBmbGFnOiBjYjk0ZTQyMzQ4YjQ1NTBjOTdmMmVlMTY5N2M0ZjFmNQ== Simple base64 encoding. Flag: cb94e42348b4550c97f2ee1697c4f1f5 …
The FIRST CTF 2020 included an ICS track that consisted of 3 questions related to the investigation of different industrial scenarios. Tripping over DNP3 What is…
The network challenge consisted of 11 tasks we had to solve.The same PCAP file was given for the first nine challenges, and there were two other…
The FIRST CTF 2020 included a forensics track that consisted of 7+1 questions related to the investigation of one single image file that participants could download. …
We have been watching closely how the malicious activity in CUJO AI-protected networks changed in relation to the COVID-19 situation. Cyber Attacks in 2020 Target Unprotected…