Critically Underrated: Studying the Data Distribution Service (DDS) Protocol


Researchers from Trend Micro Research, TXOne, ADLINK, Alias Robotics, and ZDI looked into the Data Distribution Service (DDS) standard and its implementations from a security angle. The full findings of this research will be presented in the S4X22 Conference in April 2022.

Read more

CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware

Credit to Author: Deep Patel| Date: Fri, 08 Apr 2022 00:00:00 +0000

We discovered active exploitation of a vulnerability in the Spring Framework designated as CVE-2022-22965 that allows malicious actors to download the Mirai botnet malware.

Read more

Cyclops Blink Sets Sights on Asus Routers

Credit to Author: Feike Hacquebord| Date: Thu, 17 Mar 2022 00:00:00 +0000

This report discusses the technical capabilities of this Cyclops Blink malware variant that targets ASUS routers and includes a list of more than 150 current and historical command-and-control (C&C) servers of the Cyclops Blink botnet.

Read more

Oil/Gas Cybersecurity: Halt Critical Operation Attacks

Credit to Author: Kazuhisa Tagaya| Date: Tue, 15 Mar 2022 00:00:00 +0000

Trend Micro has released a technical report on how the oil and gas industry can gain situational awareness across OT, IT and CT.

Read more

Utility Cybersecurity: Situational Awareness Cuts Risk

Credit to Author: Kazuhisa Tagaya| Date: Mon, 14 Mar 2022 00:00:00 +0000

Trend Micro has released a technical report on how the electric utility industry can gain situational awareness across entire network.

Read more

Defending the Supply Chain: Why the DDS Protocol is Critical in Industrial and Software Systems


In 2021, a team of researchers from Trend Micro Research, TXOne, ADLINK, Alias Robotics, and ZDI looked into the Data Distribution Service (DDS) standard and its implementations from a security angle. The full findings of this research will be presented in the S4X22 Conference in April 2022.

Read more

Defending Users’ NAS Devices From Evolving Threats

Credit to Author: Stephen Hilt| Date: Thu, 20 Jan 2022 00:00:00 +0000

In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices.

Read more