Illegal Upload Protection

When a client uploads a file to a server, NSFOCUS WAF performs protection based on the file type. If the file type matches an illegal upload restriction policy, NSFOCUS WAF allows or blocks the upload based on the corresponding action specified in the policy, and logs the event. On the...

Turkey Companies Targeted by RedBeard with Phishing Attacks

I. Summary Recently, NSFOCUS Security Labs observed some phishing attacks targeting Turkish companies, including the Turkish industrial group Borusan Holding, communication operator Turkcell, bank Vakıf Katılım, and online lottery service company Nesine. The attacker placed different types of phishing documents and new Trojan programs in this group of activities to...

Nacos Raft Protocol Deserialization Code Execution Vulnerability

Overview Recently, NSFOCUS CERT found that there was a deserialization vulnerability in Nacos's Raft protocol. Due to the Nacos cluster's unrestricted use of Hessian for deserialization when processing some Jraft requests, attackers can execute code. Affected users should take protective measures as soon as possible. Vulnerability DetailsVulnerability PoCVulnerability EXPUtilization in...

An Insight into RSAC 2023: Lateral Movement in Kubernetes

At the RSA Conference 2023, Yossi Weizman, Senior Security Researcher at Microsoft Defender for Cloud, shared with us the lateral movement of the Kubernetes (aka K8s) cluster and its impact on the cloud environment. Based on Yossi's speech and NSFOCUS researchers’ understanding, this paper describes the use of lateral movement...

An Insight into RSAC 2023: 6 Keywords of RSAC 2023

Keyword 1: Stronger Together Alone we can do so little; together we can do so much." - Helen Keller The theme of this year's conference is "Stronger Together". What does "Stronger" mean? What is the specific scope to be “Together”? “Stronger" refers to the ability of the business itself to...

NSFOCUS Lua-based Anti-DDoS Solution

Limitations of Pre-configured DDoS Protection Policies Lots of organizations have realized that DDoS defense is critical to the availability of network infrastructure. But most Anti-DDoS solutions in the market still rely on pre-configured protection policies with multiple threshold options to offer multi-layered protection at different levels. However, this approach has...

NSFOCUS
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.