NSFOCUS

2018 DDoS Attack Landscape-9

June 12, 2019

Behind DDoS attacks, there are complex economic interests in the underground industry. Therefore, effective governance needs to start from multiple dimensions, including policy, industry, resource, and technical dimensions. This chapter dwells upon how to mitigate DDoS attacks from the following perspectives.

(more…)

Adobe Security Bulletins for June 2019 Security Updates Threat Alert

June 11, 2019

Overview

On June 11, 2019, local time, Adobe officially released June’s security updates to fix multiple vulnerabilities in its various products, including Adobe Flash Player, Adobe Campaign, and Adobe ColdFusion. (more…)

IP Reputation Report-06032019

June 6, 2019

  1. Top 10 countries in attack counts:

(more…)

Absolute Computrace Security Risk Threat Alert

June 5, 2019

Overview

Recently, a researcher discovered that his computer motherboard BIOS comes with an anti-theft trace application Computrace from Absolute, which, after a computer startup, will be silently installed by the operating system and then transmit data overseas. Besides, this software can remotely obtain users’ files from their computers, monitor their behavior, and download and install unknown programs in an unauthorized manner. (more…)

Issues Related to the Application of Machine Learning in Security Threat Scenarios

June 4, 2019

At RSA 2019, as indicated by Bugra Karabey, the senior risk manager from Microsoft, artificial intelligence (AI) and machine learning (ML) technologies have found a ubiquitous application in the cybersecurity field. Currently, ML is the most popular AI technology which is extensively used. Meanwhile, people begin to think about drawbacks and even security risks of ML.

(more…)

Threat Model ATT&CK

June 3, 2019

1.    Introduction

AI/ML is a hot topic in RSA Conference 2019. Current artificial intelligence (AI) can be roughly divided into perceptual intelligence (capabilities of perceiving images, audio, and video) and cognitive intelligence (knowledge-based reasoning and causal analysis). Most algorithms in use nowadays are perceptual. (more…)

Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerabilities Threat Alert

May 31, 2019

Overview

On May 15, 2019, local time, Cisco officially released a security advisory, announcing remediation of three critical remote code execution vulnerabilities (CVE-2019-1821, CVE-2019-1822, and CVE-2019-1823) in the Cisco Prime Infrastructure (PI) and Evolved Programmable Network Manager (EPN). (more…)

Adobe Releases May’s Security Updates Threat Alert

May 30, 2019

Overview

On May 14, 2019, local time, Adobe officially released May’s security updates to fix multiple vulnerabilities in its various products, including Adobe Flash Player, Adobe Acrobat and Reader, and Media Encoder. (more…)

2018 DDoS Attack Landscape-8

May 29, 2019

3.6  Industrial Distribution of Attack Targets

From an industry perspective, cloud service/Internet data center (IDC), gaming, and e-commerce are top 3 industries suffering the most DDoS attacks. (more…)

DDoS Attacks and Mitigation

May 29, 2019

Nowadays, the advancement of information technology has brought tremendous convenience to people. Whether it is social networking or ecommerce, the Internet has become an integral and essential part of our lives. As Internet brought new opportunities, it also created new threats. DDoS is one of the most destructive form of threats. In the past decade, DDoS has been weaponized by various organizations and individuals used for ransomware, revenge, even cyber warfare. (more…)

Search

Subscribe to the NSFOCUS Blog