Latest insights

  • IoT Malware Journals: Prometei (Linux)

    The IoT Malware Journals series will cover the IoT threat landscape from a technical perspective. For this first article in the series, I will analyze the…

  • Restricted Environment IoT Hacking: All You Need Is a Remote Shell

    I recently decided to analyze some binaries on an IoT camera I had Telnet access to. What should have been as easy as copying files from…

  • Building an Advanced Fingerprinting Detector AI

    In two earlier posts, we introduced the problem of browser fingerprinting and showed a static fingerprinting detector AI that is based on the raw text content…

  • How Telecoms Can Gain an Advantage: AI Value-Added Services

    Telecommunications companies are some of the most data-rich organizations investing in artificial intelligence (AI) technologies. We have already written about using AI for telecom analytics, and…

  • A Look Back at 2020

    The festive spirit is in full swing, and 2021 is upon us. As we look back at the year’s accomplishments, there is no better time than…

  • Telecom Analytics Using Artificial Intelligence

    The telecommunications market is a mature industry with several key areas ripe for optimization and differentiation. Network service providers (NSP) have extreme amounts of connectivity data…

  • Meet Jeremy Otis – General Counsel at CUJO AI

    This year, Jeremy Otis joined CUJO AI as the General Counsel. We did a short interview about his background at some of Finland’s top companies and…

  • Machine Learning Security Evasion Competition 2020 Results and Behind the Scenes

    Back in 2019, Hyrum Anderson and I organized the Machine Learning Security Evasion Competition (MLSEC), where participants had to modify malware samples to remain functional and…

  • Why CUJO AI Device Intelligence Is Unaffected by MAC Randomization

    Artificial intelligence solves issues that seem insurmountable to network service providers (NSPs) relying on rule-based or list-based solutions, such as MAC addresses for Wi-Fi steering, authentication,…

  • DNS Hijacking Attacks on Home Routers in Brazil

    Recently, we have observed ongoing attacks on residential gateways. These attacks had a common trait: they all originated...

  • The True Impact of MAC Randomization on Network Service Operators

    We expect media access control (MAC) address randomization to be the default setting on more than 30% of mobile devices by Feb 2021. Since many network…

  • MAC Address Randomization: Privacy at the Cost of Security and Convenience

    Media access control (MAC) address randomization is a challenge for most traditional network operators and public Wi-Fi services. All iOS 14 devices have randomization enabled by…

  • Reverse Engineering Go Binaries with Ghidra

    Go (also called Golang) is an open source programming language designed by Google in 2007 and made available to the public in 2012. It gained popularity…

  • FIRST SecLounge CTF 2020 Solutions

    The FIRST 2020 Virtual Challenge Competition was organized at the end of June as a virtual version of the annual CTF (Capture the Flag) held by…

  • UPX Anti-Unpacking Techniques in IoT Malware

    Attackers are always at the forefront of inventing new techniques to stay covert. It comes by no surprise that their tradecraft is also subject to continuous…