With the advancement of IT-based transformation and the rapid development of IT, various network technologies have seen more extensive and profound applications, along with which come a multitude of cyber security issues. Come to find out what information security issues you should beware of in the workplace. (more…)
Category: Blog
IP Reputation Report-11032019
Top 10 countries in attack counts: (more…)
Cybersecurity Insights-3
Overall Cybersecurity Situation 3.1 Attack Type Distribution Based on attack type13, DDoS contained the largest proportion of malicious IP addresses; more than half were involved in DDoS attacks. Other types of attacks that malicious IP addresses participated in included botnets, scanning, and spam. (more…)
Kibana Remote Code Execution Vulnerability (CVE-2019-7609) Threat Alert
Vulnerability Description In February 2019, an official announcement was made that Kibana had a remote code execution vulnerability. The Kibana version prior to 5.6.15 and 6.6.1 had a functional flaw in the Timelion visualization tool, which allowed an attacker to use Kibana to execute arbitrary code on the server. Currently...
Cisco Aironet Access Points Unauthorized Access Vulnerability Threat Alert
Overview On October 17, local time, Cisco issued a security notice claiming that an unauthorized access vulnerability to Aironet Access Points (APs) was fixed. The vulnerability stems from the fact that no specific URL is filtered. An attacker can obtain the access rights of the device by constructing a malicious...
Weblogic High Risk Vulnerability Threat Alert
Overview Recently, Oracle fixed two high-risk vulnerabilities in Weblogic (CVE-2019-2890 and CVE-2019-2891) in its October critical patch update. References: https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html (more…)





