

Cynamics blog


30.10.23
Cisco Hack... Nobody Saw It Coming. We Did.
“Hackers have exploited an unpatched zero-day vulnerability in Cisco’s networking software to compromise tens of thousands of devices,...
23.10.23
Designing Security: The Power of UX/UI in Cybersecurity
Imagine this: You're about to go on a journey through a maze, but before you go in, you have a checklist: ✓ Put on comfortable shoes?...
6.9.23
How Micro-Segmentation Strategy Can Protect You From Ransomware
Ransomware campaigns are well known for quietly penetrating the perimeter, exploiting internal machines, and from there propagating and...
31.7.23
“CYNAMICS—A Market Juggernaut…And We Did It In Only 4 Years"
Introduction from Cynamics Director of Government Sales, Anthony Gomez: "I recently had a conversation with our CEO. He reinforced...
26.6.23
Cynamics Revolutionizing Threat Detection: First Guys Through the Wall
There’s a great scene at the end of Moneyball where John Henry, owner of the Red Sox, is talking to Billy Beane, GM of the Oakland A’s....
22.6.23
Cynamics Asks To Recreate MOVEit Ransomware Environment To Provide CISA Playbook
BOSTON, June 22, 2023 The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI warned on June 7, 2023, that the Cl0P...
12.6.23
China Wants Your Satellite...
The Financial Times article “China Building Cyber Weapons to Attack Enemy Satellites” should have everyone worried. CISA describes China...
21.3.23
Detecting NTP Attacks with Cynamics NDR
NTP (Network Time Protocol) is one of the most common protocols in IP networks and is implemented in most network devices. Its role is to...
16.1.23
Hidden Pattern Recognition (HPR) - Sustainable, Greener AI-based NDR
Today’s AI models are becoming resources heavy, pollutants, and overeating electricity for training their giant neural networks, leaving...
19.12.22
The Zero-Trust Philosophy With Cynamics
A new philosophy regarding cybersecurity has been circling around the internet with the name "zero-trust" philosophy. This philosophy...
8.12.22
Hidden Pattern Recognition (HPR) - Generic and Agnostic Ransomware Detection
Ransomware is on the rise, with a new spike every year in the number of reported incidents and the amount that cyber hackers are...
7.12.22
Why Is It Important For Your Network To Use a Network Detection and Response (NDR) Solution?
To properly operate a business means there needs to be a network security plan in place to secure daily operations and data that keep the...
22.11.22
Action Plan for Network Blueprints
Network security teams will benefit by following a deliberate action plan to create, maintain and utilize a network blueprint to support...
14.11.22
Hidden Pattern Recognition (HPR): Future-Ready NDR
Today’s networks are complex and complicated, becoming a messy mix between on-prem (physical network), private-cloud, and public-cloud...
7.11.22
Hidden Pattern Recognition (HPR): The only response for AI attackers for NDR
Just like organizations are using AI to cut through the noise and provide insights into their data – bad actors are also taking advantage...
2.11.22
An Overview of the Cynamics Platform
Founded in 2018 and headquartered in Boston, Cynamics supports an artificial intelligence (AI)- driven, next-generation, network...
1.11.22
Why Should You Implement a Network Detection and Response Tool?
As more digital infrastructures move to the cloud, the network gets more complex and opens up the possibility of vulnerabilities to its...
18.10.22
What Is a Network Blueprint?
Any engineer knows the value of a blueprint. Originally named in the context of reproduction—the old blueprinting process would result in...
12.10.22
Cynamics Presenting a Hidden Pattern Recognition (HPR) Approach for Network Detection and Response
As per Gartner and TAG Cyber, in Cynamics we are creating a new category - Next Generation (NG) Network Detection and Response (NDR) -...
5.10.22
State-sponsored hackers attacked US defense organizations and stole sensitive info
Hackers infiltrated a defense industrial base organization, maintained “persistent, long-term” access to its network, and absconded with...