Data Distribution Service: Mitigating Risks Part 3
In the final chapter of our blog series, we discuss mitigating strategies and recommendations to keep DDS protected from malicious actors.
In the final chapter of our blog series, we discuss mitigating strategies and recommendations to keep DDS protected from malicious actors.
In part two of our series, we’ll highlight both known and new DDS vulnerabilities and what they mean for mission critical operations.
Credit to Author: Trend Micro Research| Date: Mon, 11 Jul 2022 00:00:00 +0000
In this blog entry, we discuss how open-source code has been subjected to protest-driven code modifications by its maintainers or backers. We also provide an analysis of what these incidents could mean for the IT industry and the open source community.
Read moreCredit to Author: Jun Morimoto| Date: Mon, 11 Jul 2022 00:00:00 +0000
How to secure your private 5G networks; The challenge of complex ecosystem in DX.
Read moreCredit to Author: Jun Morimoto| Date: Tue, 05 Jul 2022 00:00:00 +0000
The importance of proof of “security” concepts in private 5G networks: Are verifications of system operations and new functions sufficient for your proof of concept in private wireless networks?
Read moreCredit to Author: Magno Logan| Date: Thu, 07 Jul 2022 00:00:00 +0000
We investigate cloud-based cryptocurrency miners that leverage GitHub Actions and Azure virtual machines, including the cloud infrastructure and vulnerabilities that malicious actors exploit for easy monetary gain.
Read moreCredit to Author: Jun Morimoto| Date: Tue, 05 Jul 2022 00:00:00 +0000
Are “new” protocols and “private” networks sufficient for your cybersecurity requirements?
Read moreCredit to Author: Nathaniel Morales| Date: Wed, 06 Jul 2022 00:00:00 +0000
We recently found a new ransomware family, which we have dubbed as HavanaCrypt, that disguises itself as a legitimate Google Software Update application and uses a Microsoft web hosting service IP address as its command-and-control (C&C) server to circumvent detection.
Read more
In this three-part blog series, we’ll look into Data Distribution Service, why it is critical, and how you can mitigate risks associated with it.
Credit to Author: Jon Clay| Date: Thu, 30 Jun 2022 00:00:00 +0000
What danger lies around the corner?
Read more