Recently we launched a small site called the "CyberSift Attack Map" hosted at http://attack-map.cybersift.io. Any one involved in the InfoSec industry will be instantly familiar with the site: It's basically a map of attacks which either trip some rule in a signature based IPS such as SNORT, or land in a honeypot. In this article we'll list … Continue reading How we built the CyberSift Attack Map
Inspired by http://blog.tylerbuchea.com/super-simple-react-redux-application-example/ Update 14/12/2018: Fixed code errors spotted by Enjin Nine... thank you very much! In this article we explore the barest of solutions to get started with React Native + Redux. The only pre-requisite to the below is to have "create-react-native-app" installed (https://facebook.github.io/react-native/docs/getting-started.html) Setup create-react-native-app superSimple cd superSimple npm install --save redux react-redux redux.js … Continue reading Super Simple React Native Redux Example
Maybe the link between your smartphone keyboard and current machine learning research in cybersecurity is not apparent at first glance, but the technology behind both is extremely similar: both leverage deep learning architectures called Recurrent Neural Networks [RNNs], specifically a type of RNN called Long Short Term Memory [LSTM]. One of the main advantages of … Continue reading What do Smartphone Predictive Text and Cybersecurity have in common?
I've recently published the thesis I wrote in fulfillment of my Masters in Computer Security, entitled BioRFID: A Patient Identification System using Biometrics and RFID Anyone interested can download and read the whole thesis here: https://www.researchgate.net/publication/317646400_BioRFID_A_Patient_Identification_System_using_Biometrics_and_RFID In this article I'll give an extremely compressed version of the thesis and how the work therein can be … Continue reading Cyber Security: Sparse coding and anomaly detection
The good, the bad, & the ugly... There are some very obvious connections between bitcoin and cybersecurity; almost every hacker who blackmails their victims via ransomware or whatever other hack demand payment in bitcoin. This is the ugly side of bitcoin and cybersec; by it's very nature bitcoin is pseudo-anonymous (read: difficult to trace), decentralized (read: difficult … Continue reading Bleeding edge: The intersection of Bitcoin and cyber-security
A big part of what we do at CyberSift is anomaly detection. The recent WannaCry attack highlighted the growing threat of ransomware in the security landscape. The WannaCry authors may have made amateur mistakes, and there may be more stealthy and profitable attacks than WannaCry, but the negative impact it has had on Windows users … Continue reading Anomaly detection vs Ransomware