Latest insights

  • Threat Alert: Mirai/Gafgyt Fork with New DDoS Modules Discovered

    On the 27th of August, we have found evidence that an IoT device in one of our customer environments had accessed a malicious software sample. We…

  • Android Malware: An Overview

    Android is a very popular mobile operating system, running on around 50 percent of all mobile devices globally and around 40 percent in North America. The…

  • Most Popular Gaming Consoles by Real Usage, Not Sales Numbers

    What is the bestselling gaming platform? Are the ‘most popular’ consoles we see in sales number reports – the same ones most people play games on?…

  • 15 Most Popular IoT Products and Devices in 2021

    The most popular Internet of Things (IoT) devices range from wearable tech to exotic home appliances. Our advanced AI algorithms monitor and protect over 1 billion…

  • FIRST SecLounge CTF 2021 – Challenge Solutions

    HMI Pwning 1 HMI Pwning 2 HMI Pwning 3 HMI Pwning 4 HMI Pwning 5 The Golden DNS Part 1 The Golden DNS Part 2 The…

  • Top IoT Security Threats – IoT Chronicle, June

    Earlier this year, CUJO AI announced that its coverage reached more than 1 billion connected devices. This scale gives us a unique insight into the IoT…

  • Most Security Threats to Mobile Devices Come from Unsafe Browsing

    Our AI-driven cybersecurity algorithms currently protect over 1 billion devices on end-user networks, where mobile phones make up over 36% of all connected devices. As we…

  • The State of Connected Devices in North America 2020/21

    The defining consumer connected device distribution, popularity and usage report based on CUJO AI Explorer data from more than 1 billion connected devices in North America,…

  • Honeypot Journals: Credential Attacks and Lessons from Recent Honeynet Incursions

    If you look at a digital attack map, you might think it is impossible for these cyber incursions to happen so rapidly. Thankfully, CUJO AI Labs…

  • Machine Learning Security Evasion Competition 2021 Calls for Researchers and Practitioners

    The annual machine learning (ML) security evasion competition invites ML practitioners and security researchers to compete against their peers in two separate tracks: the defender challenge…

  • DEF CON Quals CTF 2021: the CHSH Game, Entangled qubits, and Decrypting the Flag

    On the first weekend of May, our team from CUJO AI Labs participated in the DEF CON CTF 2021 QUALS. Although we didn’t qualify for DEF…

  • Detecting Rogue Devices with Artificial Intelligence

    Rogue devices are malicious machines placed inside networks to steal data or otherwise spy on network users. The owners of these devices might range from your…

  • CUJO AI Celebrates Its 6th Birthday

    In just six short years CUJO AI has become the leading advanced multi-layer cybersecurity company in the telecommunications industry. Protecting over 1 billion devices, our AI…

  • Building Products for Easier Telco Big Data Analysis and Access

    Telecommunications is a big data business that often lacks scalable and proven solutions for data access and analysis. Evolving technologies and privacy concerns create tangible barriers…

  • Using Artificial Intelligence in Telecom Security

    Today, 75% of enterprises rely on AI-based platforms and solutions for network security. Large telecommunications networks are no exception, thanks to the tangible benefits AI-driven network…