Year: 2021

How to Analyze Security Alarms (1): A Perspective into Data

September 30, 2021

In today’s business security operations, the tide of security information and event management (SIEM) is on the ebb. Many enterprises have established the security operations center (SOC) and collected massive security data. But how to make use of and analyze such data remains a problem to be resolved. Data, after being collected, is usually stored, […]

Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2

September 27, 2021

Analysis of the Kill Chain of the LockFile Ransomware Group KDU Tool Terminating Multiple Antivirus Processes The attacker renames the KDU tool (open-source Windows driver loader implementing DSG bypass via an exploit) autologin, copies the related program to the temporary directory, and loads and executes the designated driver file to execute code with kernel privileges […]

Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 1-2

September 26, 2021

Event Overview Recently, NSFOCUS CERT discovered a slew of security incidents that exploited security vulnerabilities (ProxyShell) in Microsoft Exchange. Also, NSFOCUS found that the new LockFile ransomware group LockFile took advantage of these ProxyShell and PetitPotam vulnerabilities to target enterprise domain environments, finally encrypting quite a few hosts from enterprises for ransom. In April, a […]

New Architecture, New Challenges: Service Security Issues in the 5G Core Network and How to Detect Them

September 24, 2021

Abstract: 5G is the fifth-generation technology standard for mobile communication networks. The service-based architecture (SBA) of the 5G core network is designed with a cloud-native approach. By borrowing the “microservice” concept implemented in the IT field and dividing a whole entity with multiple functions into individual parts, each providing an independent function, the SBA provides […]

Linux Kernel Arbitrary Code Execution Vulnerability (CVE-2021-3490) Threat Alert

September 18, 2021

Overview Recently, NSFOCUS CERT found that a security researcher published details and the PoC of an arbitrary code execution vulnerability (CVE-2021-3490) in eBPF and exploited this vulnerability to cause local privilege escalation on Ubuntu 20.10 and 21.04. This vulnerability exists because the eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the […]

Cloud Native Security in Infrastructure Construction

September 15, 2021

Cloud native security is the development trend of cloud security in the coming years. On the one hand, inherent security of cloud native is worthy of in-depth study. On the other hand, with the reconstruction and upgrade of infrastructure, there is a clear trend towards the integration of cloud native technologies and information infrastructure. 5G, edge […]

NSFOCUS Attends APEX CBET II

September 14, 2021

BEIJING. – Sep 14, 2021 The 2nd APEC Cross-Border E-Commerce Training (APEC CBET II) is held at 9:00am-11:30am (GMT+8) on September 8, 15 & 22, 2021 by the Department of International Trade and Economic Affairs of the Ministry of Commerce of China, supported by DHgate. This event is facilitated specifically to discuss about digital transformation […]

Top Four Risks When Using Serverless Function in Cloud Native Applications

September 10, 2021

Serverless is a new computing mode of the cloud native architecture, mainly taking the form of function as a service (FaaS). For the serverless mode, developers will write a function and define when and how to invoke it and then the function will run in the server provided by the cloud provider. All developers need […]

API Security in Cloud Native Applications

September 7, 2021

Cloud native applications, based on the microservice architecture, interact with each other by sending requests or response through APIs. Arguably, API communications play an essential role in interactions of cloud native applications. Therefore, API security is an indispensable part of cloud native application security. API-related security issues shown below have a direct impact on security […]

INFRAHALT: NicheStack TCP/IP Stack High-Risk Vulnerabilities Threat Alert

September 3, 2021

Overview Recently, researchers from JFrog and Forescout released a joint report to publicly disclose 14 security vulnerabilities (collectively referred to as INFRA:HALT) in the NicheStack TCP/IP stack, announcing that these vulnerabilities could lead to remote code execution, denial of service, information disclosure, TCP spoofing, or DNS cache poisoning. Researchers noted that attackers that successfully exploited […]

Search

Subscribe to the NSFOCUS Blog