Regional APT Threat Situation In November 2025, the global threat hunting system of Fuying Lab detected a total of 28 APT attack activities. These activities were primarily concentrated in regions including South Asia and East Asia, with a smaller portion also found in Eastern Europe and Middle East. Some organizations...
Author: admin
O que é segurança na nuvem? Como funciona o Cloud Security
Com o aumento do armazenamento e processamento de dados na nuvem, proteger informações sensíveis tornou-se uma preocupação crucial para indivíduos e empresas. Neste artigo, mergulharemos no conceito de segurança cloud e exploraremos como o Cloud Security funciona para garantir a proteção dos dados. Conheça mais sobre os mecanismos de segurança...
Unlocking New Possibilities for Security Operations: NSFOCUS’s AI Agent Capabilities Recognized by Authoritative Institution
Recently, Forrester, a globally renowned independent research and advisory firm, released the report "Navigate The AI Agent Ecosystem In China, Forrester Research, October 2025[1]." NSFOCUS was successfully included in this report. In the report, Forrester identified four key technological trends: DeepSeek’s breakthroughs are accelerating AI agent evolution. Agentic AI capabilities...
Banco de dados na nuvem: o que é e como fazer de forma segura?
Neste artigo, você vai entender o que é um banco de dados na nuvem, como ele funciona, quais são os principais modelos e serviços oferecidos no mercado, os riscos envolvidos e, principalmente, como garantir uma implantação segura e eficaz. Ao final, ainda indicamos uma solução que agrega camadas extras de...
Securing the AI Revolution: NSFOCUS LLM Security Protection Solution
As Artificial Intelligence technology rapidly advances, Large Language Models (LLMs) are being widely adopted across countless domains. However, with this growth comes a critical challenge: LLM security issues are becoming increasingly prominent, posing a major constraint on further development. Governments and regulatory bodies are responding with policies and regulations to...
Hong Kong’s New Critical Infrastructure Ordinance will be effective by 1 January 2026 – What CIOs Need to Know
As the clock ticks down to the full enforcement of Hong Kong's Protection of Critical Infrastructures (Computer Systems) Ordinance on January 1, 2026, designated operators of Critical Infrastructures (CI) and Critical Computer Systems (CCS) must act decisively. This landmark law mandates robust cybersecurity measures for Critical Computer Systems (CCS) to...


