Traditional DDoS protection solutions are designed to address flexibility, scheduling, and value addition requirements. However, the advent of the software-defined networking (SDN) technology, especially its combination with network virtualization, provides a new way to deploy security devices. NSFOCUS's SDN-based intelligent cleaning system discussed here can intelligently detect DDoS attacks and...
Category: DDoS Mitigation
IP Reputation Report-12082019
Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at December 08, 2019. (more…)
Cybersecurity Insights-8
5.2 Web Attacks 5.2.1 Trend of Web Attacks Of all attacks targeting web servers in 2018, 89% of them still employed common methods such as server information disclosure, resource leech, SQL injection, and cross-site scripting. Hackers are using an increasing number of web server or plug-in vulnerabilities. In 2018, vulnerability...
Tracking and Analysis of the LoJack/CompuTrace Incident
1. Introduction to LoJack With a history of 20 years, Absolute Software has been a leading provider for device security, management, and tracking. Its products have set an industry standard for persistent endpoint security and data risk management for computers, laptops, tablets, and smartphones. In 2005, Absolute Software released LoJack...
IP Reputation Report-12012019
Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at December 01, 2019. (more…)
Cybersecurity Insights-7
Insights into Malicious Traffic 5.1 Vulnerability Exploitation Here we classify vulnerabilities into server vulnerabilities desktop application vulnerabilities device vulnerabilities (more…)



