Latest insights

  • AI-driven Network Security: How Telecom Operators Use Algorithms

    A few weeks ago, Ivar Beljaars, our VP of Sales and Business Development, discussed why growth-oriented telecom operators invest in AI to deliver new Value-Added Services (VAS).…

  • FIRST SecLounge CTF 2020 – RE and Misc Challenges

    FIRST CTF 2020 included a reversing track that consisted of 6+1 questions related to the field of reverse engineering.   Break the Snake  A small Python BreakMe…

  • FIRST SecLounge CTF 2020 – Crypto Challenges

    The FIRST CTF 2020 included a crypto track that consisted of 7 questions related to different cryptography challenges.   Decode This  WW91ciBmbGFnOiBjYjk0ZTQyMzQ4YjQ1NTBjOTdmMmVlMTY5N2M0ZjFmNQ== Simple base64 encoding.  Flag: cb94e42348b4550c97f2ee1697c4f1f5 …

  • FIRST SecLounge CTF 2020 – ICS Challenges

    The FIRST CTF 2020 included an ICS track that consisted of 3 questions related to the investigation of different industrial scenarios.   Tripping over DNP3  What is…

  • FIRST SecLounge CTF 2020 – Network Challenges

    The network challenge consisted of 11 tasks we had to solve.The same PCAP file was given for the first nine challenges, and there were two other…

  • FIRST SecLounge CTF 2020 – Forensics Challenges

    The FIRST CTF 2020 included a forensics track that consisted of 7+1 questions related to the investigation of one single image file that participants could download.  …

  • What Drives AI Investment in the Telecommunications Industry?

    Enterprises worldwide are constantly looking for ways to become more profitable, generally by cutting costs or turning to innovation.   This year marks a new phase for the global artificial intelligence (AI) market: Businesses face complex issues when the scale of their –…

  • Genetics of a Modern Internet of Things (IoT) Attack

    When it comes to IoT attacks and malware, there is a perceptible pattern in which most intrusions manifest. It is good practice to study such...

  • CUJO AI Labs Won the FIRST 2020 Virtual Challenge Competition

    Last week, four of us from CUJO AI Labs spent three days solving complex challenges in network, cryptography, reverse engineering, programming, puzzle and other categories in…

  • Building a Browser Fingerprinting Detector AI

    Back in April, I wrote an article where I introduced the problem of browser fingerprinting, showed websites that use it to track users, and dived into…

  • CUJO AI Partners with Microsoft for the Machine Learning Security Evasion Competition 2020

    Last year, Dr. Hyrum Anderson, now the Principal Architect (Security Machine Learning) at Microsoft, and I designed a competition, and it was a huge success. It was launched at…

  • Cyber Attacks on the Rise in 2020

    We have been watching closely how the malicious activity in CUJO AI-protected networks changed in relation to the COVID-19 situation. Cyber Attacks in 2020 Target Unprotected…

  • The Crucial Remote Work Security Checklist

    There’s been a lot of information recently on the soft side of our new remote reality, like how to focus, retain productivity or simply stay sane.…

  • COVID-19 Related Malicious Activity

    As all extraordinary events that keep the world’s attention captive for months, COVID-19 has been used as bait in various malicious activities online. New Malicious Activity in 2020 We…

  • Browser Fingerprinting in Action

    The basis of online tracking is the accurate identification of users – you are detected and identified even when you’re just passing through a random website…