NSFOCUS

What are the differences between DDoS attacks on the application layer and the network layer

Uma imagem que ilustra um teclado com uma tecla escrita ddos attack.

November 13, 2023

The market for services protecting against distributed denial of service attacks, or Anti-DDoS, has a significant focus on mitigating attacks aimed at the network layer of companies’ infrastructure. In this type of attack, infected vectors are commonly used to generate requests without the aim of concrete communication, intending to flood internet transmission links with an […]

The New APT Group DarkCasino and the Global Surge in WinRAR 0-Day Exploits

November 10, 2023

Overview In 2022, NSFOCUS Research Labs revealed a large-scale APT attack campaign called DarkCasino and identified an active and dangerous aggressive threat actor. By continuously tracking and in-depth study of the attacker’s activities, NSFOCUS Research Labs has ruled out its link with known APT groups, confirmed its high-level persistent threat nature, and following the operational […]

NTA SMTP Functionality Usage

November 10, 2023

Customers can enable SMTP functionality to ensure timely receipt of alert notifications and device logs. Below are the steps to configure SMTP functionality. Configuring an SMTP Server 1. Choose Administration > Third-Party Interface > Email Service and click SMTP Server 2. Configure parameters Parameters for configuring an SMTP server: Parameter Description SMTP Server Address Specifies […]

Software Supply Chain Security Solution – Supply Chain Security Control

November 9, 2023

Establishing a Software Supply Chain Asset Register An organization’s products and services are diverse and complex. By establishing a software supply chain asset register, you can have a clear understanding of the supply chain relationships within your organization. The organization needs to create a comprehensive inventory of suppliers, software, tools, services, and upstream and downstream […]

NSFOCUS WAF Running Modes

November 7, 2023

NSFOCUS WAF supports multiple running modes. You can modify the running mode based on the network topology. Deployment Topology Deployment Topology can be set to In-Path, Out-of-Path, Reverse Proxy, Mirroring or Plugin-enabled. Mode Configuration Mode Configuration can be set to one of the following values (modes vary with deployment topologies): Emergency Mode After entering the […]

Bolstering API Security and Bot Attack Protection with NSFOCUS Next-Generation WAF

November 6, 2023

NSFOCUS’s Next-Generation WAF addresses various threats faced by users, such as web vulnerability exploitation, resource abuse, and resource access control. It provides a comprehensive solution that includes traditional WAF functionality, bot traffic management, API security, and DDoS protection, all integrated into one coherent system. The upgraded system architecture ensures the security of web applications, business […]

Atlassian Confluence Improper Authentication Vulnerability (CVC-2023-22518) Notification

November 2, 2023

Overview Recently, NSFOCUS CERT monitored that Atlassian officially fixed an improper authentication vulnerability in the Atlassian Communication Data Center and Server (CVE-2023-22518). Unauthenticated remote attackers can bypass the authentication of the target system to a certain extent by constructing malicious requests and obtain the authority to take over the server through the backend interface, achieving […]

F5 BIG-IP Remote Code Execution Vulnerability (CVE-2023-46747) Notification

October 31, 2023

Overview Recently, NSFOCUS CERT monitored that F5 had released a security announcement to fix a remote code execution vulnerability in BIG-IP (CVE-2023-46747). Due to the problem of F5 BIG-IP forwarding AJP protocol through Apache httpd, requests were smuggled, which could bypass permission verification. Unauthenticated remote attackers can access the BIG-IP system through the BIG-IP management […]

Introduction to WAF Exception Policy

October 27, 2023

Exception policies are supplements or restrictions to configured basic or advanced protection policies. On the Exception Policy page, you can create, edit, delete, and duplicate exception policies. You can also create and edit exception policies on the Website Protection page. Configuration procedure: Choose Security Management > Policy Management > Exception Policy, click Create in the […]

Citrix NetScaler ADC and Gateway Sensitive Information Disclosure Vulnerability (CVC-2023-4966) Notification

October 26, 2023

Overview Recently, NSFOCUS CERT detected a sensitive information disclosure vulnerability in Citrix NetScaler ADC and Gateway (CVE-2023-4966). When the device is configured as a gateway (VPN virtual server, ICA proxy, CVPN, RDP proxy) or AAA virtual server, unauthorized remote attackers can exploit this vulnerability to access sensitive information and cause information leakage. The CVSS score […]

Search

Subscribe to the NSFOCUS Blog