Prediction of Ransomware Campaigns
In this paper, we will look into several real-life examples of DNS abuse of internal servers, which are not DNS servers, sending DNS queries for Command and Control (C&C).
Explaining Autoencoders Using SHAP
This whitepaper walks through the research process done in the Cynamics AI Team for explaining Autoencoders.
The Cynamics Journey to AWS GovCloud
Thinking about moving from regular AWS cloud to GovCloud? Benefit from Cynamics' expertise for a smooth transition for your company.
Using Malicious Pings for C&C and Data Leakage
See what happened when Cynamics detected malicious usage of allegedly innocent ping packets for its public sector and government clients, and the mitigation steps that followed.
Every Moment Counts
Modern networks grow more complex and interconnected each day. With new connections
comes increased potential for vulnerabilities and backdoors.
Cynamics Data Sheet
Cynamics keeps your networks secured and optimized, providing complete visibility of the threats and risks.
Inferring complete network visibility from small traffic samples is a hard
problem in both academy and industry.
Cynamics’ core breakthrough is the ability to keep learning and evolving automatically and autonomously from each new customer by a combination of 2 deep learning frameworks.