The market for services protecting against distributed denial of service attacks, or Anti-DDoS, has a significant focus on mitigating attacks aimed at the network layer of companies' infrastructure. In this type of attack, infected vectors are commonly used to generate requests without the aim of concrete communication, intending to flood...
Category: Blog
The New APT Group DarkCasino and the Global Surge in WinRAR 0-Day Exploits
Overview In 2022, NSFOCUS Research Labs revealed a large-scale APT attack campaign called DarkCasino and identified an active and dangerous aggressive threat actor. By continuously tracking and in-depth study of the attacker's activities, NSFOCUS Research Labs has ruled out its link with known APT groups, confirmed its high-level persistent threat...
Software Supply Chain Security Solution – Supply Chain Security Control
Establishing a Software Supply Chain Asset Register An organization's products and services are diverse and complex. By establishing a software supply chain asset register, you can have a clear understanding of the supply chain relationships within your organization. The organization needs to create a comprehensive inventory of suppliers, software, tools,...
Bolstering API Security and Bot Attack Protection with NSFOCUS Next-Generation WAF
NSFOCUS's Next-Generation WAF addresses various threats faced by users, such as web vulnerability exploitation, resource abuse, and resource access control. It provides a comprehensive solution that includes traditional WAF functionality, bot traffic management, API security, and DDoS protection, all integrated into one coherent system. The upgraded system architecture ensures the...
Atlassian Confluence Improper Authentication Vulnerability (CVC-2023-22518) Notification
Overview Recently, NSFOCUS CERT monitored that Atlassian officially fixed an improper authentication vulnerability in the Atlassian Communication Data Center and Server (CVE-2023-22518). Unauthenticated remote attackers can bypass the authentication of the target system to a certain extent by constructing malicious requests and obtain the authority to take over the server...
F5 BIG-IP Remote Code Execution Vulnerability (CVE-2023-46747) Notification
Overview Recently, NSFOCUS CERT monitored that F5 had released a security announcement to fix a remote code execution vulnerability in BIG-IP (CVE-2023-46747). Due to the problem of F5 BIG-IP forwarding AJP protocol through Apache httpd, requests were smuggled, which could bypass permission verification. Unauthenticated remote attackers can access the BIG-IP...




