NSFOCUS

Office Area——Screen Lock

November 8, 2018

Case AnalysisCase Analysis

Different employees assume different duties, and therefore have different permissions to access company data. If you do not lock your screen when you are out for lunch or go to the restroom, other co-workers may see the contents on your screen and those with ulterior motives may open files saved on your computer or even copy them to a USB drive. (more…)

Technical Report on Container Security (II)-1

11 Security Solutions for Small Business

November 7, 2018

Container Basics — Container Image

Container Image

Images are the basis of containers. The container engine service can use different images to launch different containers. After a container becomes faulty, the service can be promptly restored by deleting the faulty container and launching a new one thanks to the underlying technique of container images[i]. (more…)

Multiple Cisco Vulnerabilities Threat Alert

November 6, 2018

Overview

Recently, Cisco released an official security advisory to announce fixes for multiple high-risk vulnerabilities, which could cause a denial of service and remote code execution. (more…)

Office Area——Strangers’ Entrance

November 2, 2018

Office safety should not be underestimated.

(more…)

Technical Report on Container Security (I)

October 31, 2018

Overview

In recent years, the cloud computing model has gradually been universally recognized and accepted in the industry. In China, sectors such as governments, finance, carriers, and energy as well as small and medium-size organizations, to varying degrees, have migrated their business to the cloud. However, just turning hosts, platforms, or applications into virtual form cannot solve their legacy issues such as slow upgrade, clumsy architecture, and no support for rapid iteration. Then the concept of cloud native comes into being. (more…)

Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend

October 28, 2018

Help Net Security – Here’s an overview of some of last week’s most interesting news and articles: Repairnator bot finds software bugs, successfully submits patches Can a bot create valid, high-quality fixes for software bugs more rapidly than a human can, and get them accepted by human developers and permanently merged in the code base? […]

LIVE NETWORKS LIVE555 Streaming Media RTSP Server Remote Code Execution Vulnerability(CVE-2018-4013) Threat Alert

October 26, 2018

Overview

Recently, the TALOS team disclosed a critical remote code execution vulnerability (CVE-2018-4013). This vulnerability exists in the HTTP packet parsing functionality of the LIVE555 RTSP server library. An attacker could exploit this vulnerability to cause a stack-based buffer overflow via a specially crafted packet, resulting in code execution. (more…)

FreeRTOS Multiple Remote Code Execution Vulnerabilities Threat Alert

October 25, 2018

Overview

Recently, researchers from Zimperium disclosed 13 critical vulnerabilities in FreeRTOS, including four remote code execution vulnerabilities. (more…)

Drupal Remote Code Execution Vulnerability Threat Alert

October 24, 2018

Overview

Recently, Drupal released an official security advisory to announce the fixes for multiple security issues, including two critical remote code execution vulnerabilities which affect Drupal 7 and 8.

The two critical vulnerabilities are described as follows: (more…)

libssh Server-Side Identity Authentication Bypass Vulnerability (CVE-2018-10933)Threat Alert

October 23, 2018

Overview

On October 16, local time, libssh officially released an update to fix the server-side identity authentication bypass vulnerability (CVE-2018-10933) existing in libssh 0.6 and later versions. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication, the attacker could successfully authenticate without any credentials. (more…)

Search

Subscribe to the NSFOCUS Blog