Which 5 IoT Devices Are Attacked Most Often?
According to our device intelligence data, IoT devices make up around 33% of all devices connected to consumer home networks. These devices are infamous for their…
CUJO AI is home to some of the brightest people with decades of experience in the cybersecurity, data science, and telco industry. To arrange a deeper discussion or public appearance with our experts, get in touch.
According to our device intelligence data, IoT devices make up around 33% of all devices connected to consumer home networks. These devices are infamous for their…
I know, I know, we are a bit late with this one, but better late than never 🙂 What everyone writing these predictions loves is that…
As evidenced by our latest annual cybersecurity report, network-attached storage (NAS) devices attract an outsized number of attacks. An average NAS device is targeted hundreds of…
CUJO AI Labs have just released a new cybersecurity report. Download it now! CUJO AI Sentry stopped 2,102,990,310 threats between May 1 and November 1, 2022,…
Warning: Don’t try this at home! Following these steps might involve you losing money. You have been warned! UPDATE: After sharing this story I got contacted…
This annual cybersecurity report dives into real-world data from CUJO AI Sentry to reveal which device types and brands face the most online threats. In this…
At the end of November, CUJO AI Labs reported a new botnet written in Golang – now called Zerobot – which contained 21 exploits for various…
2022 was a busy year at CUJO AI. We not only welcomed a new CEO, but also successfully launched two stand-alone products for network service providers…
As Eufy’s products are in the spotlight for poor security practices, we looked at our device intelligence data to find out how many consumers might be…
At CUJO AI, we like to play with new technologies. And even though we have provided machine learning-based 0-day phishing protection since 2019, we do not…
Consumer expectations for the connected experience are undergoing a tectonic shift, driven by a growing variety of connected devices. In a few decades, we went from…
And the winners of the MLSEC 2022 challenge are Facial Recognition First place – Alex Meinke Facial Recognition Second place – Zhe Zhao Phishing First Place…
Consumers are using a larger variety of devices and have a growing need for more personalized and optimized connected experiences. To improve the connected experience inside…
Network service providers (NSPs) are between a rock and a hard place. As consumers use a larger variety of connected devices, their expectations for the connected…
This is the second part in our series about reverse engineering Go binaries with Ghidra. In the previous article, we discussed how to recover function names…