Defending the Supply Chain: Why the DDS Protocol is Critical in Industrial and Software Systems

In 2021, a team of researchers from Trend Micro Research, TXOne, ADLINK, Alias Robotics, and ZDI looked into the Data Distribution Service (DDS) standard and its implementations from a security angle. The full findings of this research will be presented in the S4X22 Conference in April 2022. Read More HERE…

Read more

This Week in Security News – January 21, 2022

 This week, read about various cybersecurity threats that affect industrial control and the Cybersecurity and Infrastructure Security Agency (CISA)’s latest cyberattack warnings. Read More HERE…

Read more

Defending Users’ NAS Devices From Evolving Threats

In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices. Read More HERE…

Read more

LoRaWAN’s Protocol Stacks: The Forgotten Targets at Risk

This report is the fourth part of our LoRaWAN security series, and highlights an attack vector that, so far, has not attracted much attention: the LoRaWAN stack. The stack is the root of LoRaWAN implementation and security. We hope to help users secure it and make LoRaWAN communication resistant to critical bugs. Read More HERE…

Read more

This Week in Security News – January 7th, 2022

This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones. Read More HERE…

Read more

This Week in Security News – January 7, 2022

This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones. Read More HERE…

Read more

Examining Log4j Vulnerabilities in Connected Cars and Charging Stations

In this entry we look into how Log4j vulnerabilities affect devices or properties embedded in or used for connected cars, specifically chargers, in-vehicle infotainment systems, and digital remotes for opening cars. Read More HERE…

Read more

The Log4j story, and how it has impacted our customers

Read about the Log4j story, an analysis of the impact and what to do next. Read More HERE…

Read more