With the rapid growth of the internet, especially in areas like cloud computing, 5G, and IoT technologies, the scale of botnets continues to expand, intensifying the battle between attack and defense. In response, DDoS attacks have evolved, taking on a more intelligent form to evade security defenses. Traditional DDoS attacks...
Blog
Countdown to GovWare 2024: Join NSFOCUS at Booth D05!
As we gear up for GovWare 2024, taking place from October 15 to 17 at the Sands Expo and Convention Centre in Singapore, we are thrilled to invite you to visit NSFOCUS at Booth D05. With just a week to go, the excitement is palpable, and we can’t wait to...
Decoding the Double-Edged Sword: The Role of LLM in Cybersecurity
Large Language Models (LLMs) are essentially language models with a vast number of parameters that have undergone extensive training to understand and process human language. They have been trained on a wide array of texts, enabling them to assist in problem-solving across various domains. Security professionals are also exploring the...
Remote Code Execution Vulnerability Alert of Unix CUPS Print Service (CVE-2024-47076 / CVE-2024-47175 / CVE-2024-47177)
Overview Recently, NSFOCUS CERT monitored the disclosure of the details of remote code execution vulnerabilities for Unix CUPS printing service on the Internet. When the system enables cups-browsed process listening (default port 631) to receive UDP packets, unauthenticated attackers induce victims to configure by constructing a malicious IPP server. When...
Over 300,000! GorillaBot: The New King of DDoS Attacks
Overview In September 2024, NSFOCUS Global Threat Hunting System monitored a new botnet family calling itself Gorilla Botnet entering an unusually active state. Between September 4 and September 27, it issued over 300,000 attack commands, with a shocking attack density. During this active period, Gorilla Botnet targeted over 100 countries,...
Are More Than Two-Thirds of Websites Vulnerable?
Cybersecurity threats have become a norm, with old vulnerabilities still frequently exploited and new ones emerging continuously, posing significant challenges to web security. Zero-day vulnerabilities have become a critical tool for attackers to breach defenses. According to a Gartner survey, over 75% of information security attacks focus on web applications,...


