AI-driven Network Security: How Telecom Operators Use Algorithms
A few weeks ago, Ivar Beljaars, our VP of Sales and Business Development, discussed why growth-oriented telecom operators invest in AI to deliver new Value-Added Services (VAS).…
CUJO AI is home to some of the brightest people with decades of experience in the cybersecurity, data science, and telco industry. To arrange a deeper discussion or public appearance with our experts, get in touch.
A few weeks ago, Ivar Beljaars, our VP of Sales and Business Development, discussed why growth-oriented telecom operators invest in AI to deliver new Value-Added Services (VAS).…
FIRST CTF 2020 included a reversing track that consisted of 6+1 questions related to the field of reverse engineering. Break the Snake A small Python BreakMe…
The FIRST CTF 2020 included a crypto track that consisted of 7 questions related to different cryptography challenges. Decode This WW91ciBmbGFnOiBjYjk0ZTQyMzQ4YjQ1NTBjOTdmMmVlMTY5N2M0ZjFmNQ== Simple base64 encoding. Flag: cb94e42348b4550c97f2ee1697c4f1f5 …
The FIRST CTF 2020 included an ICS track that consisted of 3 questions related to the investigation of different industrial scenarios. Tripping over DNP3 What is…
The network challenge consisted of 11 tasks we had to solve.The same PCAP file was given for the first nine challenges, and there were two other…
The FIRST CTF 2020 included a forensics track that consisted of 7+1 questions related to the investigation of one single image file that participants could download. …
Enterprises worldwide are constantly looking for ways to become more profitable, generally by cutting costs or turning to innovation. This year marks a new phase for the global artificial intelligence (AI) market: Businesses face complex issues when the scale of their –…
When it comes to IoT attacks and malware, there is a perceptible pattern in which most intrusions manifest. It is good practice to study such...
Last week, four of us from CUJO AI Labs spent three days solving complex challenges in network, cryptography, reverse engineering, programming, puzzle and other categories in…
Back in April, I wrote an article where I introduced the problem of browser fingerprinting, showed websites that use it to track users, and dived into…
Last year, Dr. Hyrum Anderson, now the Principal Architect (Security Machine Learning) at Microsoft, and I designed a competition, and it was a huge success. It was launched at…
We have been watching closely how the malicious activity in CUJO AI-protected networks changed in relation to the COVID-19 situation. Cyber Attacks in 2020 Target Unprotected…
There’s been a lot of information recently on the soft side of our new remote reality, like how to focus, retain productivity or simply stay sane.…
As all extraordinary events that keep the world’s attention captive for months, COVID-19 has been used as bait in various malicious activities online. New Malicious Activity in 2020 We…
The basis of online tracking is the accurate identification of users – you are detected and identified even when you’re just passing through a random website…