Latest insights

  • Which 5 IoT Devices Are Attacked Most Often?

    According to our device intelligence data, IoT devices make up around 33% of all devices connected to consumer home networks. These devices are infamous for their…

  • IT Security Predictions for 2023

    I know, I know, we are a bit late with this one, but better late than never 🙂  What everyone writing these predictions loves is that…

  • The Most Attacked Devices in Consumer Homes: Network Attached Storage (NAS) Security Review

    As evidenced by our latest annual cybersecurity report, network-attached storage (NAS) devices attract an outsized number of attacks. An average NAS device is targeted hundreds of…

  • What 2.1 Billion Cybersecurity Threats Can Tell Us About Consumer Home Network Security

    CUJO AI Labs have just released a new cybersecurity report. Download it now! CUJO AI Sentry stopped 2,102,990,310 threats between May 1 and November 1, 2022,…

  • How I Got $88 from a WhatsApp Scammer And “Forgot” to “Reinvest” It

    Warning: Don’t try this at home! Following these steps might involve you losing money. You have been warned! UPDATE: After sharing this story I got contacted…

  • Cybersecurity Report 2023: Consumer Devices Under Threat

    This annual cybersecurity report dives into real-world data from CUJO AI Sentry to reveal which device types and brands face the most online threats. In this…

  • The Zerobot Botnet: Vulnerabilities Targeted and Exploits Used in Detail

    At the end of November, CUJO AI Labs reported a new botnet written in Golang – now called Zerobot – which contained 21 exploits for various…

  • CUJO AI Year in Review: 2022

    2022 was a busy year at CUJO AI. We not only welcomed a new CEO, but also successfully launched two stand-alone products for network service providers…

  • Eufy Security Vulnerabilities: How Many Households Might Be Affected?

    As Eufy’s products are in the spotlight for poor security practices, we looked at our device intelligence data to find out how many consumers might be…

  • Protecting the World, One NFT at a Time

    At CUJO AI, we like to play with new technologies. And even though we have provided machine learning-based 0-day phishing protection since 2019, we do not…

  • Device Intelligence Is Crucial for the Future of Network Service Providers

    Consumer expectations for the connected experience are undergoing a tectonic shift, driven by a growing variety of connected devices. In a few decades, we went from…

  • MLSEC 2022 – The Winners and Some Closing Comments

    And the winners of the MLSEC 2022 challenge are Facial Recognition First place – Alex Meinke  Facial Recognition Second place – Zhe Zhao Phishing First Place…

  • CUJO AI Explorer White Paper

    Device Intelligence – Helping Transform Connected Experiences

    Consumers are using a larger variety of devices and have a growing need for more personalized and optimized connected experiences. To improve the connected experience inside…

  • Device Identities and Context for Network Service Providers

    Network service providers (NSPs) are between a rock and a hard place. As consumers use a larger variety of connected devices, their expectations for the connected…

  • Reverse Engineering Go Binaries with Ghidra, Part 2: Type Extraction, Windows PE Files and Golang Versions

    This is the second part in our series about reverse engineering Go binaries with Ghidra. In the previous article, we discussed how to recover function names…