Digital Operatives
  • Home
  • Blog
  • Careers
  • Contact
  • Products
  • Research
  • Services
Select Page
Defeating Cisco’s Machine Learning Based Malware Traffic Detection Algorithm

Defeating Cisco’s Machine Learning Based Malware Traffic Detection Algorithm

Reading /r/netsec today, I happened to come across this recycled old 2017 blog post from Cisco security about detecting malware by applying machine learning to encrypted communications. Admittedly, it’s an interesting idea. At some point malware started using...
The Cyber-Insecurity of WeWork – Shared Offices and Cracking WiFi with Weak WPA2 Passwords

The Cyber-Insecurity of WeWork – Shared Offices and Cracking WiFi with Weak WPA2 Passwords

On Monday we became a tenant at the shared office provider WeWork. According to their website, “WeWork is a global network of workspaces where companies and people grow together.” We needed something more flexible while our new corporate office is being...

Recent Posts

  • Defeating Cisco’s Machine Learning Based Malware Traffic Detection Algorithm
  • The Cyber-Insecurity of WeWork – Shared Offices and Cracking WiFi with Weak WPA2 Passwords
  • Idea Machine – Part 1: Automated Reconnaissance For Penetration Testing
  • Target Audiences In Cyber Security
  • (Automated) Vulnerability Analysis is Hard

Archives

  • October 2018
  • September 2018
  • May 2018
  • September 2017
  • August 2017
  • July 2017
  • June 2016
  • April 2015
  • February 2015
  • September 2014
  • February 2014
  • January 2014
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • December 2012
  • November 2012
  • October 2012

Categories

  • Capture the Flag
  • Products
  • Research
  • Security News
  • Services
  • Uncategorized