Overview Microsoft released the June 2020 security patches on Tuesday that fix 130 vulnerabilities ranging from simple spoofing attacks to remote code execution in various products, including Adobe Flash Player, Android App, Apps, Azure DevOps, Diagnostics Hub, HoloLens, Internet Explorer, Microsoft Browsers, Microsoft Edge, Microsoft Edge (Chromium-based) in IE Mode,...
Blog
IP Reputation Report-06212020
1. Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at June 21, 2020. (more…)
2019 Cybersecurity Insights -3
Overall Situation Attack Type Distribution In terms of attack types 1, DDoS attracted the largest proportion (35%) of malicious IP addresses. Other types that malicious IP addresses were most interested in included spam, botnets, and scanning. Of all malicious IP addresses, 15% exploited more than one attack vector. According to...
Adobe Security Bulletins for June 2020 Security Updates
Overview On June 10, 2020, local time, Adobe officially released June's security updates to fix multiple vulnerabilities in its various products, including Adobe FrameMaker, Adobe Experience Manager, and Adobe Flash Player. For details about the security bulletins and advisories, visit the following link: https://helpx.adobe.com/security.html (more…)
Yongyou NC Remote Command Execution Vulnerability Threat Alert
Overview Recently, a domestic security organization released a security advisory to announce a remote code execution vulnerability in Yongyou NC. An attacker could exploit this vulnerability to trigger a deserialization vulnerability via a crafted HTTP request, causing remote code execution on a target server. Yongyou NC is a piece of...
WebSphere Remote Code Execution Vulnerability (CVE-2020-4450) Threat Alert
Vulnerability Description On June 5, Beijing time, IBM released a security advisory to announce the fix of a remote code execution vulnerability (CVE-2020-4450) in WebSphere Application Server (WAS). This vulnerability is caused by deserialization of the IIOP protocol. An unauthenticated attacker could target the WAS server remotely via the IIOP...





