Hardware Hacking 101: E01 I2C Sniffing, How to Listen to Your Arduino’s I2C Bus
Introduction Hardware hacking is one of those topics that I always had a great interest in, but almost always lacked the free time and equipment to…
CUJO AI is home to some of the brightest people with decades of experience in the cybersecurity, data science, and telco industry. To arrange a deeper discussion or public appearance with our experts, get in touch.
Introduction Hardware hacking is one of those topics that I always had a great interest in, but almost always lacked the free time and equipment to…
CUJO AI specializes in providing robust multi-layered cybersecurity for network operators, which protects all end-user devices in their home networks. While the CUJO AI Agent runs…
Over 50% of people are at least moderately concerned about cybersecurity threats and the impact they might have on their lives. And, when a person is…
2021 was a year of expansive growth and recognition for our company. We have solidified our position as the largest cybersecurity service provider for the leading…
As the number of IoT devices in an average household continues to grow, so does the number and the sophistication of attacks...
CUJO AI is the largest provider of multi-layer security for large network operators around the world. CUJO AI's algorithms process data from...
A few years ago, we contributed our knowledge and experience to a project concerning the ethical use of AI by the World Economic Forum (WEF). We…
As we’re looking at another Black Friday, we can expect consumers to expose themselves to more cybersecurity threats thanks to their purchases. This article will look…
Many Internet users In the US, Germany, France, and Italy are concerned about their security online, as evidenced by the results of our annual...
CUJO AI has surveyed four countries: the US, Germany, France, and Italy, to examine how consumers see cybersecurity threats, what privacy threats concern them the most,…
One of our honeypots has recently captured an interesting attack that we have not seen before. In this article, we will go through the peculiarities of…
Which mobile operating system (OS) is more secure: iOS or Android? This straightforward question does not have a simple answer. As with most topics in IT…
This is the second episode in the Honeypot Journals series, where we report our most recent findings from our honeynet logs. This time, we...
Our increasing reliance on AI systems may present an expanding attack surface to motivated adversaries. To proactively drive awareness of this issue, CUJO AI partnered with…
In this year’s MLSEC competition, the Attacker Challenge included a new anti-phishing evasion track. The phishing detector was provided by CUJO AI, and it contained an…