Blog

UC Browser Potential Man-in-the-Middle Vulnerability Threat Alert

April 2, 2019 | Mina Hao

Overview Recently, a foreign researcher discovered a potential vulnerability in the UC browser which may affect hundreds of millions of users around the world. A hidden feature is found in the UC browser to download auxiliary software modules for execution by bypassing some restrictions of an application store. This feature is used to add new […]

PostgreSQL Arbitrary Code Execution Vulnerability (CVE-2019-9193) Threat Alert

April 1, 2019 | Mina Hao

1 Vulnerability Overview Recently, a security researcher disclosed details about a PostgreSQL privilege escalation code execution vulnerability (CVE-2019-9193), which allows attackers with read access to database server-side files to execute arbitrary system commands.

Daily Communication——Use of Shared Folders

March 29, 2019 | Mina Hao

Case Analysis Public shared folders usually house various documents from different departments, many of which contain sensitive data. Sensitive files reside in such folders mainly because people forget to delete them after copying them, thus exposing sensitive data to intranet hackers and rogue insiders.

Apache Tomcat DoS Vulnerability (CVE-2019-0199) Threat Alert

March 28, 2019 | Mina Hao

1 Vulnerability Overview Recently, The Apache Software Foundation announced the existence of a denial-of-service (DoS) vulnerability in Apache Tomcat HTTP/2. Specifically, the HTTP/2 implementation accepts streams with excessive numbers of SETTINGS frames and also permits clients to keep streams open without reading/writing request/response data. Thus, too many connection requests from clients can cause server-side thread […]

Technical Report on Container Security (V)-3

March 27, 2019 | Mina Hao

Security Tools – StackRox About StackRox StackRox features a distributed architecture that collects and analyzes data throughout the application lifecycle to detect and block malicious actors, and finally meet the requirement for protecting containerized cloud-native applications. StackRox delivers continuous detection through its unique combination of distributed sensors and centralized analysis and machine learning to provide […]

NSFOCUS Attack Threat Monitoring Wins 2019 Cyber Defense Magazine InfoSec Award

March 26, 2019 | Devika Jain

Earlier this month at RSA we released the newest service in our arsenal of holistic hybrid security solutions, Attack Threat Monitoring (ATM). We were thrilled not only to demo ATM at our RSA booth, but even more pleased to release the service to the public having already won an award. Cyber Defense Magazine examines thousands […]

Adobe Security Bulletins for March 2019 Security Updates Threat Alert

March 26, 2019 | Mina Hao

Overview On March 12, 2019 (local time), Adobe released security updates which address multiple vulnerabilities in Adobe Photoshop CC and Adobe Digital Editions.

Cisco RV110W, RV130W, and RV215W Routers Web-based Management Interface Remote Code Execution Vulnerability Threat Alert

March 25, 2019 | Mina Hao

Overview On February 27 (local time), Cisco officially released a security advisory to announce a critical security vulnerability (CVE-2019-1663) in Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router. This vulnerability exists in the web-based management interface of the preceding products, which fails to properly validate user-supplied […]

IP Reputation Report-03222019

March 22, 2019 | Mina Hao

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at March 22, 2019. It’s the first time that Japan got into the top 10 list.

Daily Communication——Release of Code on GitHub

March 21, 2019 | Mina Hao

Case Analysis Before compromising a website or system, a hacker usually searches for related information beforehand. Code repositories are a major target. A security-unaware developer may upload code to a public platform, providing an opportunity for hackers to obtain API accounts or security holes by analyzing the uploaded code.