Shining Moments for NSFOCUS DDoS Defense in 2024
December 31, 2024
January – Release of the 2023 Global DDoS Landscape Report In the 2023 Global DDoS Landscape Report, NSFOCUS proposed important insights on global DDoS threats. DDoS attacks have become an indispensable weapon in cyber warfare, attackers are gradually favoring the use of Virtual Private Server (VPS) as attack sources, and the DDoS attack mode has […]
NSFOCUS ISOP Listed in The Security Analytics Platform Landscape Report by Forrester
December 30, 2024
SANTA CLARA, Calif., December 30, 2024 – We are thrilled to announce that NSFOCUS was selected as the notable vendor of Forrester The Security Analytics Platform Landscape, Q4 by its ISOP (Intelligent Security Operations Platform) with built-in NSFGPT AI assistant and AI-empowered security operation scenarios. “The security analytics platform is the core of the security […]
Adobe ColdFusion Any File Read Vulnerability (CVE-2024-53961)
December 26, 2024
Overview Recently, NSFOCUS CERT detected that Adobe issued a security announcement and fixed any file read vulnerability in Adobe ColdFusion (CVE-2024-53961). Due to improper restrictions on pathnames in Adobe ColdFusion, unauthenticated attackers can bypass the application’s restrictions to read files or directories outside of the restricted directory. As a result, sensitive information may be disclosed […]
Apache Tomcat Conditional Competition Code Execution Vulnerability (CVE-2024-50379)
December 19, 2024
Overview Recently, NSFOCUS CERT detected that Apache issued a security announcement, fixing the Apache Tomcat conditional competition code execution vulnerability (CVE-2024-50379). Due to the inconsistency between Windows file system and Tomcat in case-distinguishing processing of paths, when the write function of default servlet is enabled (set readonly=false and allow PUT method), unauthenticated attackers can construct […]
Apache Struts Arbitrary File Upload Vulnerability S2-067 (CVE-2024-53677)
December 16, 2024
Overview Recently, NSFOCUS CERT monitored that Apache released a security bulletin, fixing the Apache Struts arbitrary file upload vulnerability S2-067 (CVE-2024-53677). Due to a logical defect in the file upload function, an unauthenticated attacker can perform path traversal by controlling the file upload parameters, thereby uploading malicious files to achieve remote code execution. The CVSS […]
Microsoft’s December Security Update of High-Risk Vulnerabilities in Multiple Products
December 14, 2024
Overview On December 11th, NSFOCUS CERT monitored that Microsoft released the December security update patch, fixing 72 security issues involving widely-used products such as Windows, Windows LDAP, Microsoft Office, Windows Remote Desktop Services, and Microsoft SharePoint. These include high-risk vulnerability types such as privilege escalation and remote code execution. Among the vulnerabilities fixed in this […]
NSFOCUS DDoS Protection Service Neutralized a Terabit-Scale DDoS Attack
December 10, 2024
In Q4 of 2024, NSFOCUS observed and successfully mitigated the largest DDoS attack ever recorded under the cloud-based DDoS Protection Service (DPS). This massive DDoS attack targeted a telecommunications service provider, one of NSFOCUS’s global clients. The telecommunications industry frequently faces such cyber threats. However, the scale of this attack was unprecedented, with peak traffic […]
NSFOCUS’s Coogo: An Automated Penetration Testing Tool
December 6, 2024
The video above demonstrates an automated penetration test in a simple container escape scenario. In this video, in addition to using NSFOCUS’s open-source cloud-native cyber range software Metarget (for quickly and automatically building vulnerable cloud-native target machine environments), NSFOCUS’s own developed cloud-native attack suite Coogo is also utilized. Today, we will provide a brief introduction […]
Zabbix Server SQL Injection Vulnerability (CVE-2024-42327)
December 3, 2024
Overview Recently, NSFOCUS CERT detected that Zabbix released a security announcement and fixed the SQL injection vulnerability (CVE-2024-42327) of Zabbix server. Due to the SQLi vulnerability in the CUser class in the addRelatedObjects function, attackers with default user permission or API access can call the CUser.get function. This could lead to unauthorized access to sensitive […]