CUJO AI Labs

47 Followers
33 Following
32 Posts
‼️We are closing this account - follow us at https://bsky.app/profile/cujoailabs.bsky.social
🐬András will dive deep into #OpenThread technology and showcase the newly developed Flipper Zero Thread radio extension board. Insights into Thread network configurations, security risks, and a hands-on demo—including modifying an NRF USB dongle for Flipper Zero compatibility.
🐍From DGA surge detection to uncovering a highly evasive and capable threat actor: Aurelio Picon @thebluehunter from @cujoailabs SecLab investigates and monitors the tactics behind ViperSoftX.
Read the full story here https://cujo.com/blog/vipersoftx-tracking-and-countering-a-persistent-threat/
#CyberSecurity #ThreatIntel #MalwareAnalysis
ViperSoftX: Tracking And Countering a Persistent Threat - CUJO AI

ViperSoftX is a family of highly sophisticated malware, employing a wide range of evasion techniques and complex communication strategies.

CUJO AI
@jschwart wow, that is interesting 😊 thx for sharing
🤖 cheap Android set-top boxes might come with unexpected surprises. 0/10, would not recommend to buy https://cujo.com/blog/android-set-top-box-lies-about-its-os-version-comes-pre-infected-with-malware/
Android Set-top Box Lies about Its OS Version, Comes Pre-infected with Malware - CUJO AI

Android set-top boxes are a security concern. Here's why you shouldn't trust their OS version info.

CUJO AI
Another year, another opportunity to do exciting IoT research at our company https://www.hit.bme.hu/page/paripa
BME-HIT

BME Department of Networked Systems and Services

🔥Balint Bicski and Adrian Pekar at CNSM Conference presenting their research:
Early Detection of Network Service Degradation: An Intra-Flow Approach

Fortinet's last security blog included a section called "A Call to the Industry: Doing the Right Thing for the Security of our Society", which is good. It talks about "transparent disclosure of discovered vulnerabilities" and "radical transparency".

In other news, Fortigate are almost two weeks into knowing they have a zero day which is actively exploited in one of their products, haven't issued a CVE, haven't done a public writeup, and have patch notes that don't mention the vuln.

.
Our senior vulnerability researcher, Andras Tevesz @GHost__42@twitter presenting about Thread and Flipper Zero @hacktivityconf@twitter