Office Area——Screen Lock
November 8, 2018


Case AnalysisCase Analysis
Different employees assume different duties, and therefore have different permissions to access company data. If you do not lock your screen when you are out for lunch or go to the restroom, other co-workers may see the contents on your screen and those with ulterior motives may open files saved on your computer or even copy them to a USB drive. (more…)
Technical Report on Container Security (II)-1
November 7, 2018
Container Basics — Container Image
Container Image
Images are the basis of containers. The container engine service can use different images to launch different containers. After a container becomes faulty, the service can be promptly restored by deleting the faulty container and launching a new one thanks to the underlying technique of container images[i]. (more…)
Multiple Cisco Vulnerabilities Threat Alert
November 6, 2018
Overview
Recently, Cisco released an official security advisory to announce fixes for multiple high-risk vulnerabilities, which could cause a denial of service and remote code execution. (more…)
Technical Report on Container Security (I)
October 31, 2018
Overview
In recent years, the cloud computing model has gradually been universally recognized and accepted in the industry. In China, sectors such as governments, finance, carriers, and energy as well as small and medium-size organizations, to varying degrees, have migrated their business to the cloud. However, just turning hosts, platforms, or applications into virtual form cannot solve their legacy issues such as slow upgrade, clumsy architecture, and no support for rapid iteration. Then the concept of cloud native comes into being. (more…)
Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend
October 28, 2018
Help Net Security – Here’s an overview of some of last week’s most interesting news and articles: Repairnator bot finds software bugs, successfully submits patches Can a bot create valid, high-quality fixes for software bugs more rapidly than a human can, and get them accepted by human developers and permanently merged in the code base? […]
LIVE NETWORKS LIVE555 Streaming Media RTSP Server Remote Code Execution Vulnerability(CVE-2018-4013) Threat Alert
October 26, 2018
Overview
Recently, the TALOS team disclosed a critical remote code execution vulnerability (CVE-2018-4013). This vulnerability exists in the HTTP packet parsing functionality of the LIVE555 RTSP server library. An attacker could exploit this vulnerability to cause a stack-based buffer overflow via a specially crafted packet, resulting in code execution. (more…)
FreeRTOS Multiple Remote Code Execution Vulnerabilities Threat Alert
October 25, 2018
Overview
Recently, researchers from Zimperium disclosed 13 critical vulnerabilities in FreeRTOS, including four remote code execution vulnerabilities. (more…)
Drupal Remote Code Execution Vulnerability Threat Alert
October 24, 2018
Overview
Recently, Drupal released an official security advisory to announce the fixes for multiple security issues, including two critical remote code execution vulnerabilities which affect Drupal 7 and 8.
The two critical vulnerabilities are described as follows: (more…)
libssh Server-Side Identity Authentication Bypass Vulnerability (CVE-2018-10933)Threat Alert
October 23, 2018
Overview
On October 16, local time, libssh officially released an update to fix the server-side identity authentication bypass vulnerability (CVE-2018-10933) existing in libssh 0.6 and later versions. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication, the attacker could successfully authenticate without any credentials. (more…)
