Building the IoTrain
While developing the Matter workshop for DEF CON, I wondered what fun IoT project I could create that looks catchy, works well with DEF CON visitors,…
CUJO AI is home to some of the brightest people with decades of experience in the cybersecurity, data science, and telco industry. To arrange a deeper discussion or public appearance with our experts, get in touch.
While developing the Matter workshop for DEF CON, I wondered what fun IoT project I could create that looks catchy, works well with DEF CON visitors,…
In part two I explained how to set up the environment and build a working sample firmware application.
Development Environment and a Working Matter and Thread Application.
This is the first part of the Thread Support for Flipper Zero series. The series tells the story of my OpenThread research and how I decided…
I don’t know what I did in the past, but boy do attackers love to send me phishing messages. This time, the story started with the…
Pedro Bandeira from Deutsche Telekom and Matthew Hughes from EE discuss the best practices for network providers for balancing personalization and privacy with our CEO Remko…
In the six months between April and October of this year, CUJO AI’s cybersecurity solution stopped over 3.23 billion threats, or 12,473 threats per minute, to…
Dealing with sophisticated threats is a daily challenge at CUJO AI, as part of our regular work at the Security Research Lab we have been tracking…
Foreign interference and disinformation have gotten a lot of attention in US media before the 2024 presidential election. CUJO AI Labs decided to look into the…
Cheap Android set-top boxes are being sold by criminals, which either pre-infect devices with malware or have malicious code delivered via an update. Set-top boxes are…
This article was written in collaboration with Shimon Goulkarov, the SVP of Product R&D, and Karolis Povilavičius, the Senior Device Intelligence Lab Manager. Apple’s latest updates…
To showcase how precise device identification can help network service providers evaluate and plan new CPE investments, this report looks into the growing adoption of Wi-Fi…
If you are in a situation where you need to buy a baby monitor (camera), you probably want to choose something secure, right? For most of…
February 7th, 2024, was the day when many news portals ran a story about 3 million smart toothbrushes participating in a distributed denial of service attack…
Malicious actors often use events that draw the public’s attention to promote scams. We have previously reported on the malicious activities targeting consumers during the COVID-19…