How Data Science Got Us to the Bahamas – the International Quant Championship 2023
My colleague Tihamer Kocsis and I just got back from the Global Final of the 2023 International Quant Championship (IQC) in the Bahamas. The two of…
CUJO AI is home to some of the brightest people with decades of experience in the cybersecurity, data science, and telco industry. To arrange a deeper discussion or public appearance with our experts, get in touch.
My colleague Tihamer Kocsis and I just got back from the Global Final of the 2023 International Quant Championship (IQC) in the Bahamas. The two of…
On 2021 September 5, I bought a new domain, zh4ck.eth. This domain is interesting because I used magic Internet money (a.k.a cryptocurrency) to pay for it,…
Every month, more than 62% of households in North America and Europe are exposed to threats that can be prevented by their Network Service Providers. Of…
If you are reading this, you probably know what Encrypted Client Hello (ECH) is already. It is a much more complex successor of the ESNI, an…
Introduction At this year’s Hacktivity conference we organized the SpeedHacking CTF competition. Now it’s time to tell you how the idea came together, what we did…
If you like CTF games, you will have the opportunity to try your skills at the Hacktivity conference! On Friday, find the QR code at the…
Media access control (MAC) address randomization is quickly becoming an industry standard. It impacts many internal network service provider (NSP) systems that rely on MAC addresses…
It is already late evening, and I just posted my old MacBook Pro for sale on Facebook Marketplace. I have sold many items this year, so…
This is an annual article where we present which Internet of Things (IoT) devices are the most popular, based on our latest device intelligence report. As…
The telecom industry is witnessing a remarkable transformation in customer service, driven by enhanced capabilities and an unwavering commitment to deliver exceptional support. By leveraging device…
A few weeks ago, the World Economic Forum (WEF), in collaboration with GEP, published an insight report on adopting artificial intelligence (AI), which provides a set…
Every new type of device in a consumer’s home shifts their expectations for the connected experience. The Internet of Things (IoT) ecosystem is changing, and our…
The rising use of privacy-enhancing technologies, while beneficial for users, is obfuscating devices and posing notable challenges for network service providers. While these providers can still…
We have recently published a detailed article about a “pig butchering” cryptocurrency-related scam. This is a follow-up on what happens to victims after they lose significant…
Most IoT devices have limited resources, Unix-like operating systems and inadequate cybersecurity measures, which makes them the primary target for botnets.