Pages
Resources
- Air Force takes ownership of DARPA cyber warfare program
- Culture at TwoSix, from a new guy
- Cyberwarriors lack planning tools. That could change.
- DARPA’s SIGMA Program Transitions to Protect Major U.S. Metropolitan Region
- Governor Northam Announces 87 New Jobs in Arlington County
- Pentagon weapons tester hones in on cyber tools
- Project IKE article on Yahoo News
- Two Six Labs and Gemedy Announce Strategic Alliance
- Two Six Labs announces CEO nominated for EY Entrepreneur of the Year
- Two Six Labs announces continued growth in first half of 2020
- Two Six Labs Announces Public Release of Privacy Enhancements for Android
- Two Six Labs Announces Third Anniversary as Independent Company and Record Results in 2019
- Two Six Labs Awarded $95M Air Force AI, Machine Learning Development Contract
- Two Six Labs Featured on Local News
- Two Six Labs joins NVTC's Tech 100
- Two Six Labs partners with Duality on privacy technology for COVID research
- Two Six Labs Runner Photographs Marine Corps Marathon
- Two Six Labs selected as finalist for Cyber Company of the Year by NVTC
- Two Six Labs selected as NVTC Tech 100 honoree for third year in a row
- Two Six Labs works with Microsoft, MITRE and others to protect machine learning systems
- Two Six Veterans
- Which cyber programs asked for more money ... and which didn’t?
Insights
- 6 Ways to Visualize Graphs
- Advanced Visualization for Mapping Malware Genomes
- Algorithmic Complexity Vulnerabilities: An Introduction
- An All-vs-All Scheme for Deep Learning
- An Approach for Vetting Research Prototypes at Scale
- Analyzing the Impact of Weather Events on Internet Disruptions
- API Privacy: A Look at G Suite Marketplace Permissions and Policies
- Automated AWS Knowledge Graph creation with Grakn.ai
- Automated Docker Deployment to Kubernetes with Buildbot
- Automatic Malware Capability Detection at THREADS 2013
- Automatically Generating Comments for Arbitrary Source Code
- Bidding for Builds: An Efficient, Self-Scaling way to use AWS Spot Instances for Gitlab CI
- BlueSteal: Popping GATT Safes
- Breaking BHAD: Getting Local Root on the Belkin WeMo Switch
- Breaking BHAD: Injecting Code into the WeMo App Using XSS
- Breaking BHAD: Remote Rooting WeMo Devices
- Choosing Open Source Libraries and Analyzing Risks
- Detecting DDoS Attacks with Machine Learning
- Developing a Serverless Machine Learning Product as a DevOps Engineer
- Engineered to Scale
- Escalation: Data Viz for Scientific Labs
- Faster force-directed graph layouts by reusing force approximations
- FireEye FLARE On 2016 Challenges Write Up (Pt. 1)
- FireEye FLARE On 2016 Challenges Write Up (Pt. 2)
- Fuzzing nginx with American Fuzzy Lop (not the bunny)
- Graph Layout by Random Vertex Sampling
- Intern Spotlight: Discerning Logical Segments in Source Code
- Invincea Analyzes CrowdStrike Putter Panda Intrusion Set with Cynomix
- Invincea Labs Dissects an Active Campaign Targeting America's Defense and Intel Communities
- Invincea Labs Publishes New Research Paper on Automated Malware Analysis
- Invincea Labs publishes two malware visual analysis papers at VizSec 2014
- Invincea Labs publishes two papers on machine learning malware detection
- Invincea Labs to Give Two Presentations at Black Hat
- Invincea Labs to Present an Open Source, Crowd Trained Machine Learning Model for Malware Capability Detection at Black Hat
- Invincea Performs Visual Analysis of OpCleaver Using Cynomix
- Invincea Releases Threat Research Tools
- Invincea Takes Initial Look at Regin Malware with Cynomix
- It's Dangerous To Go Alone, Take This! - Tools Gathered from Recent CTF Travels
- Killing Mirai: Active defense against an IoT botnet (Part 1)
- Pixhawk Firmware Hooking
- Privacy Enhancements for Android (PE for Android)
- Retrospective on the Unity Obstacle Tower Challenge
- Running a Baremetal Beaglebone Black (Part 1)
- Running a Baremetal Beaglebone Black (Part 2)
- Running Thousands of KVM Guests on Amazon's new i3.metal Instances
- Running Windows 64-bit in QEMU Emulation Mode
- SQLite as a Shell Script
- Streaming World Events as RDF Triples: Lessons from an Intern
- Translating Between Brain and World: Decoding Biological Neural Nets with Artificial Neural Nets
- Two Six Labs at Drexel University
- Ubuntu on UltraZed: Embedded High Performance Computing
- Understanding Network Traffic and DDoS Events through Visualization
- Using Machine Learning for Forensic Analysis in Security Incident Response
- V3SPA: An Open Source Tool for Visually Analyzing and Diffing SELinux/SE for Android Security Policies
- Visualizing Automatically Detected Periodic Network Activity
- Visualizing Programming Behaviors with Stack Overflow