On March 15th, the Cybersecurity Solutions Day event, organized by the Hong Kong Institute of Bankers (HKIB), officially commenced. The event focused on addressing the increasingly complex cybersecurity environment influenced by AI technologies, gathering globally renowned information security vendors and experts to discuss new trends and models driven by AI...
Category: Blog
Atlassian Confluence Path Traversal Vulnerability (CVE-2024-21677) Notice
Overview Recently, NSFOCUS CERT detected that Atlassian issued a security announcement and fixed the directory traversal vulnerability in Confluence Data Center and Server (CVE-2024-21677), with a CVSS score of 8.3. Unauthenticated attackers need to interact with users, and exploiting this vulnerability can have a great impact on the confidentiality, integrity,...
Your FAQ Guide to RSA Conference 2024
Here’s your essential FAQ guide for RSA Conference 2024! Whether you’re a first-timer or a seasoned attendee, this guide aims to help you navigate the conference with ease and make the most of your experience. Welcome to stop by our booth #3301 at the South Expo of Moscone Center! Q1:...
Three Major Challenges Faced by WAF in the Banking Industry
As the digital transformation is deepening, the banking industry is making efforts to build digital banks, open banks, and scenario-based financial business models. On one hand, banks are pushed to pay more attention to online operations and to enhance their openness. On the other hand, this raises higher standards for...
What Happened in Cybersecurity in 2023: A Summary of Security Incidents, Vulnerability Information, and Cybersecurity Trends
The year 2023 witnessed a dynamic and complex cybersecurity landscape, with various security incidents, vulnerabilities, and trends emerging and evolving. Today, we released the 2023 Annual Security Incident Observation Report, based on our security incident data recorded in 2023. This report provides a summary of the security incidents, the security...
AI Supply Chain Security: Hugging Face Malicious ML Models
Introduction to Hugging Face Malicious ML Models Background A recent report by JFrog researchers found that some machine learning models on Hugging Face may be used to attack the user environment. These malicious models will lead to code execution when loaded, providing the attacker with the ability to gain full...





