Data Distribution Service: Exploring Vulnerabilities and Risks Part 2
In part two of our series, we’ll highlight both known and new DDS vulnerabilities and what they mean for mission critical operations. Read More HERE…
In part two of our series, we’ll highlight both known and new DDS vulnerabilities and what they mean for mission critical operations. Read More HERE…
Are “new” protocols and “private” networks sufficient for your cybersecurity requirements? Read More HERE…
The importance of proof of “security” concepts in private 5G networks:
Are verifications of system operations and new functions sufficient for your proof of concept in private wireless networks? Read More HERE…
In this three-part blog series, we’ll look into Data Distribution Service, why it is critical, and how you can mitigate risks associated with it. Read More HERE…
We look into a recent attack orchestrated by the Black Basta ransomware ransomware group that used the banking trojan QakBot as a means of entry and movement and took advantage of the PrintNightmare vulnerability to perform privileged file operations. Read More HERE…
We analyzed cases of a Log4Shell vulnerability being exploited in certain versions of the software VMware Horizon. Many of these attacks resulted in data being exfiltrated from the infected systems. However, we also found that some of the victims were infected with ransomware days after the data exfiltration. Read More HERE…
We compare the targeting and business models of the Conti and LockBit ransomware groups using data analysis approaches. This will be presented in full at the 34th Annual FIRST Conference on June 27, 2022. Read More HERE…
Learn about the state of OT Security in 2022 by reading the key insights found through surveying more than 900 ICS business and security leaders in the US, Germany and Japan. Read More HERE…