Cynamics documents
Web Server Attacks
This whitepaper shows how Cynamics AI technology is detecting Web Server Attacks.
Brute Force Attacks
This whitepaper shows how Cynamics AI technology is detecting Brute Force Attacks.
Protect from DDoS attacks
This whitepaper shows how to protect from DDoS attacks by using Cynamics AI.
GDPR Compliance
This whitepaper shows how Cynamics AI ensures the General Data Protection Regulation (GDPR) compliance.
Protect from Cisco IOS XE Hack in 5 minutes using Cynamics AI
Cisco revealed a significant hack in their IOS software. You can follow these steps to determine if this exploitation has infected your device.
“Generative AI will destroy your organization”- This is the Cynamics response
This whitepaper details how Cynamics responded to critical mission requirements posed by a major CYBER command
Cynamics AI in the Edge and NVIDIA Datasheet
Full network protection for the largest and most complex networks with Cynamics AI in the Edge and NVIDIA
PCI DSS 4.0 - Cynamics AI in the Edge and NVIDIA
This whitepaper details how Cynamics in collaboration with NVIDIA ensures continuous validation of compliance with the Payment Card Industry Data Security Standard (PCI DSS) 4.0.
Cynamics and Underline
This case study shows how Underline established a strong security process with Cynamics
Cynamics and the City of Walla Walla
This case study shows how the City of Walla Walla achieved complete network visibility using the Cynamics Network Blueprint
“Known-to-Known״ Communications"
This whitepaper shows how Cynamics AI revealed a new, previously unknown attack vector. We call it “known-to-known” communications.
Tag Cyber's Distinguished Vendors
Dr. Aviv Yehezkel, Co-Founder & CTO of Cynamics, discusses with Tag Cyber about how Cynamics identifies threats in network traffic.
Cryptomining campaigns in your network
This whitepaper shows how Cynamics AI technology is detecting Cryptomining exploitations.
Cloud Network Detection & Response Solution
The future of NDR is total interoperability. Protection, detection, prediction – anywhere, anytime, with anything.
Cynamics Datasheet
The network has changed dramatically in the last decade, relying on a myriad of interconnected endpoints and devices that use legacy and cloud infrastructures
creating a complex hybrid architecture.
Prediction of Ransomware Campaigns
In this paper, we will look into several real-life examples of DNS abuse of internal servers, which are not DNS servers, sending DNS queries for Command and Control (C&C).
Explaining Autoencoders Using SHAP
This whitepaper walks through the research process done in the Cynamics AI Team for explaining Autoencoders.
The Cynamics Journey to AWS GovCloud
Thinking about moving from regular AWS cloud to GovCloud? Benefit from Cynamics' expertise for a smooth transition for your company.
Using Malicious Pings for C&C and Data Leakage
See what happened when Cynamics detected malicious usage of allegedly innocent ping packets for its public sector and government clients, and the mitigation steps that followed.
Every Moment Counts
Modern networks grow more complex and interconnected each day. With new connections comes increased potential for vulnerabilities and backdoors.
Network Fundamentals
Cynamics’ core breakthrough is the ability to keep learning and evolving automatically and autonomously from each new customer by a combination of 2 deep learning frameworks.
How to See the Unseen Network
A new approach to obtaining complete
visibility for your smart networks using Artificial Intelligence (AI).