Latest insights

  • Building the IoTrain

    While developing the Matter workshop for DEF CON, I wondered what fun IoT project I could create that looks catchy, works well with DEF CON visitors,…

  • Header image

    Thread Support for Flipper Zero, Part 3: Interfacing, Thread Networks and Data Sets

    In part two I explained how to set up the environment and build a working sample firmware application.

  • Header image

    Thread Support for Flipper Zero, Part 2: Setup

    Development Environment and a Working Matter and Thread Application.

  • Header image

    Thread Support for Flipper Zero, Part 1: Introduction

    This is the first part of the Thread Support for Flipper Zero series. The series tells the story of my OpenThread research and how I decided…

  • header image

    Persistent Phishing Campaign Uses Surveymonkey and Cloudflare, Bypasses Gmail’s Spam Filter

    I don’t know what I did in the past, but boy do attackers love to send me phishing messages. This time, the story started with the…

  • Webinar: Balancing Personalization and Privacy

    Pedro Bandeira from Deutsche Telekom and Matthew Hughes from EE discuss the best practices for network providers for balancing personalization and privacy with our CEO Remko…

  • The 2024 Cybersecurity Report

    In the six months between April and October of this year, CUJO AI’s cybersecurity solution stopped over 3.23 billion threats, or 12,473 threats per minute, to…

  • header image

    ViperSoftX: Tracking And Countering a Persistent Threat

    Dealing with sophisticated threats is a daily challenge at CUJO AI, as part of our regular work at the Security Research Lab we have been tracking…

  • header image

    Phishing for Votes in the Upcoming US Election 

    Foreign interference and disinformation have gotten a lot of attention in US media before the 2024 presidential election. CUJO AI Labs decided to look into the…

  • Android Set-top Box Lies about Its OS Version, Comes Pre-infected with Malware

    Cheap Android set-top boxes are being sold by criminals, which either pre-infect devices with malware or have malicious code delivered via an update. Set-top boxes are…

  • header image

    Assessing Apple’s Update to Rotating MAC Addresses

    This article was written in collaboration with Shimon Goulkarov, the SVP of Product R&D, and Karolis Povilavičius, the Senior Device Intelligence Lab Manager. Apple’s latest updates…

  • header image

    Device Intelligence Report 2024: Making Wi-Fi 7 Rollouts Count

    To showcase how precise device identification can help network service providers evaluate and plan new CPE investments, this report looks into the growing adoption of Wi-Fi…

  • Finding a Secure Baby Monitor Is Much Harder Than You’d Think

    If you are in a situation where you need to buy a baby monitor (camera), you probably want to choose something secure, right? For most of…

  • header image

    The Story About Three Million Toothbrushes Used in a DDoS Attack Is Not True

    February 7th, 2024, was the day when many news portals ran a story about 3 million smart toothbrushes participating in a distributed denial of service attack…

  • Rapid Response: the Rise of Suspicious Websites at the Start of the Israel-Hamas War

    Malicious actors often use events that draw the public’s attention to promote scams. We have previously reported on the malicious activities targeting consumers during the COVID-19…