Data Distribution Service: Exploring Vulnerabilities and Risks Part 2
In part two of our series, we’ll highlight both known and new DDS vulnerabilities and what they mean for mission critical operations.
In part two of our series, we’ll highlight both known and new DDS vulnerabilities and what they mean for mission critical operations.
Credit to Author: Magno Logan| Date: Thu, 07 Jul 2022 00:00:00 +0000
We investigate cloud-based cryptocurrency miners that leverage GitHub Actions and Azure virtual machines, including the cloud infrastructure and vulnerabilities that malicious actors exploit for easy monetary gain.
Read more
In this three-part blog series, we’ll look into Data Distribution Service, why it is critical, and how you can mitigate risks associated with it.
Credit to Author: Mohamed Fahmy| Date: Tue, 28 Jun 2022 00:00:00 +0000
We analyzed cases of a Log4Shell vulnerability being exploited in certain versions of the software VMware Horizon. Many of these attacks resulted in data being exfiltrated from the infected systems. However, we also found that some of the victims were infected with ransomware days after the data exfiltration.
Read moreCredit to Author: William Malik| Date: Fri, 24 Jun 2022 00:00:00 +0000
Why cybersecurity is the first step to private network deployment
Read moreCredit to Author: Hiroyuki Ueno| Date: Wed, 15 Jun 2022 00:00:00 +0000
Learn about the state of OT Security in 2022 by reading the key insights found through surveying more than 900 ICS business and security leaders in the US, Germany and Japan.
Read moreCredit to Author: Christoper Ordonez| Date: Mon, 02 May 2022 00:00:00 +0000
We found an AvosLocker ransomware variant using a legitimate antivirus component to disable detection and blocking solutions.
Read moreCredit to Author: Hitomi Kimura| Date: Tue, 31 May 2022 00:00:00 +0000
Users of WSO2 products are advised to update their respective products and platforms or to apply the temporary mitigation steps immediately.
Read more