NSFOCUS

Week in review: Man in the Cloud attacks, Google GDPR fine, business resilience

January 27, 2019

Help Net Security – Researchers analyze DDoS attacks as coordinated gang activities In a new report, NSFOCUS introduced the IP Chain-Gang concept, in which each chain-gang is controlled by a single threat actor or a group of related threat actors and exhibit similar behavior among the various attacks conducted by the same gang.

Cloud Expo Asia Hong Kong

January 27, 2019

Cloud Expo Asia Hong Kong May 22-23, 2019 HKCEC, Hong Kong

G2E Asia 2019

January 27, 2019

G2E Asia 2019 May 21-23, 2019 The Venetian, Macao

Telecom Exchange NYC 2019

January 27, 2019

Telecom Exchange NYC 2019 May 14-15, 2019 The W Hoboken Hotel

11th iGaming Asia Congress

January 26, 2019

11th iGaming Asia Congress March 12-14, 2019 Macau

RSA Conference 2019

January 26, 2019

RSA Conference 2019 March 4-8, 2019 Moscone Center, San Francisco, CA

APRICOT 2019

January 25, 2019

Apricot 2019 February 18-28, 2019 Daejeon, South Korea

IP Reputation Report-01252019

January 25, 2019

  1. Top 10 countries in attack counts:

  • The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 25, 2019.
  • CN increased 1% from 43% to 44% and US stayed at 12% from last week.

(more…)

Mobile Office — Two-Step Verification

January 25, 2019

Case Analysis

It is a common practice to protect an account with a password. However, the account will be compromised if the password is disclosed. Now many mobile phones or apps support two-step verification. When detecting a login to your account from another phone, the mechanism requires the other form of authentication, for example, a verification code sent via SMS.

(more…)

Technical Report on Container Security (IV)-4

January 24, 2019

Container Security Protection – Image Security

Image Security

Images are the basis of containers. Therefore, their security speaks a lot for that of the entire container ecosystem. Container images are a series of images stacked layer by layer. They are distributed and updated through image repositories. The following sections describe how to secure images from the aspects of image build security, repository security, and image distribution security. (more…)

Search

Subscribe to the NSFOCUS Blog