Adeline Zhang

Data Manipulation: The Next Level of Cyberattacks

February 20, 2019

Channel Futures – Today cyberattacks aim to steal information or hijack infrastructure. While these threats are damaging enough, nation states and bad actors are not resting on their laurels. Next up in their nasty bag of tricks is blowing a hole in data integrity via unauthorized data changes, planting false information, changing sensor reads, and […]

Technical Report on Container Security (IV)-7

February 20, 2019

Container Security Protection – Orchestration Security

Orchestration Security

The maturity of the container technology pushes the development and implementation of microservices. More and more enterprises choose to adopt a mircoservice architecture to build their applications. Container orchestration tools are responsible for managing container clusters that carry various services. Arguably, it is container orchestration tools that support core services in a variety of projects adopting a mircoservice architecture. This document takes the most popular orchestration tool in the community, Kubernetes, as an example to describe security protection measures that container orchestration tools should take. (more…)

Adobe Security Advisory for February 2019 Security Updates

February 19, 2019

Overview

On February 12, local time, Adobe officially released security bulletins and advisories to announce security updates to patch multiple vulnerabilities in such products as Adobe Flash Player, Adobe Creative Cloud Desktop Application, ColdFusion, and Adobe Acrobat and Reader. (more…)

Critical runC Container Escape Vulnerability (CVE-2019-5736) Threat Alert

February 18, 2019

  • Overview

RUNC is a CLI tool for spawning and running containers according to the Open Container Initiative (OCI) specification. As the core of the Docker, runC can be called for creating, running, and destructing containers. (more…)

NSFOCUS Cloud-in-a-Box Wins 2019 InfoSecurity Product Guide Excellence Award

February 15, 2019

NSFOCUS Cloud-in-a-Box Wins 2019 InfoSecurity Product Guide Excellence Award Four months after it was released to the general public, our newest cloud security service Cloud-in-a-Box has been named a bronze winner in the 15th annual 2019 InfoSecurity Product Guide’s Global Excellence Awards in the ‘Best Innovation in Cloud Security’ category. In this day and age, […]

IP Reputation Report-02152019

February 15, 2019

  1. Top 10 countries in attack counts:

  • The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at February 15, 2019.

(more…)

Mobile Office——Sum-up

February 15, 2019

Security Tips/Takeaways (more…)

Technical Report on Container Security (IV)-6

February 14, 2019

Container Security Protection – Runtime Security

Runtime Security

  1. Security Configuration for Container Launch

A container runs on the host as a process. Running container processes are isolated from one another. Each has its own file system, networking, and isolated process tree separate from the host. The following sections detail how to use the docker run[1] command to define a container’s resources at runtime. (more…)

IP Reputation Report-02082019

February 8, 2019

  1. Top 10 countries in attack counts:

  • The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at February 08, 2019.

(more…)

IP Reputation Report-02012019

February 1, 2019

  1. Top 10 countries in attack counts:

  • The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at February 01, 2019.

(more…)

Search

Subscribe to the NSFOCUS Blog