NSFOCUS in the News

IoT Agenda: Can California legislation save the world from IoT security risks?

May 2, 2019 | Adeline Zhang

IoT Agenda – I am known for railing against IoT devices because I consider them the eventual destroyers of the internet as we know it. They are not secure, most people that use them do not realize they are not secure, and most vendors that make them have done little knowing they are not secure.

HelpNetSecurity: The correlation between DDoS attacks and cryptomining

April 15, 2019 | Adeline Zhang

HelpNetSecurity – In NSFOCUS’ 2018 DDoS Attack Landscape report, NSFOCUS analyzed the threat landscape after a landmark year of technological growth related to cloud computing, big data, artificial intelligence (AI), Internet of Things (IoT), and Industry 4.0.

OODA Loop: The correlation between DDoS attacks and cryptomining

April 15, 2019 | Adeline Zhang

OODA Loop – A new NSFOCUS report indicates that the declining price of cryptocurrencies in 2018 prompted threat actors to stop using botnet resources for cryptomining attacks – as these were getting less and less profitable – and increasingly use them to launch distributed denial-of-service (DDoS) attacks instead.

The CyberWire: The Daily Briefing

April 11, 2019 | Adeline Zhang

The CyberWire – CISA has issued a joint Homeland Security/FBI Malware Analysis Report on the “HOPLIGHT” Trojan, attributed to North Korea’s Hidden Cobra (a.k.a. the Lazarus Group). – See more at: https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_11.html#.dpuf

Trouble at the federal CIO’s office

April 10, 2019 | Adeline Zhang

Politico – THE SAUCE ON DDoS — With cryptomining benefits on the decline, cyber attackers were more inclined to employ DDoS attacks in 2018, according to a report out this morning from NSFOCUS. However, the total number of DDoS attacks fell 28 percent from 2017, the company found. Most used DDoS only, but 13 percent […]

NSFOCUS Unveils New DDoS Mitigation Solution with Contextual Analysis

March 5, 2019 | Adeline Zhang

Cyberwire – RSAC’s 2019 edition of its Innovation Sandbox was held yesterday, with ten of the security sector’s most interesting start-ups on display. NSFOCUS, a leader in holistic hybrid security solutions, today unveiled Attack Threat Monitoring, which provides real-time insights and contextual awareness of the global DDoS threat landscape.

Data Manipulation: The Next Level of Cyberattacks

February 20, 2019 | Adeline Zhang

Channel Futures – Today cyberattacks aim to steal information or hijack infrastructure. While these threats are damaging enough, nation states and bad actors are not resting on their laurels. Next up in their nasty bag of tricks is blowing a hole in data integrity via unauthorized data changes, planting false information, changing sensor reads, and […]

Chrome 72 arrives with code injection blocking and new developer features

January 29, 2019 | Adeline Zhang

VentureBeat – Google today launched Chrome 72 for Windows, Mac, and Linux. The release includes code injection blocking and new developer features. You can update to the latest version now using Chrome’s built-in updater or download it directly from google.com/chrome. With over 1 billion users, Chrome is both a browser and a major platform that […]

Week in review: Man in the Cloud attacks, Google GDPR fine, business resilience

January 27, 2019 | Adeline Zhang

Help Net Security – Researchers analyze DDoS attacks as coordinated gang activities In a new report, NSFOCUS introduced the IP Chain-Gang concept, in which each chain-gang is controlled by a single threat actor or a group of related threat actors and exhibit similar behavior among the various attacks conducted by the same gang.

Researchers analyze DDoS attacks as coordinated gang activities

January 21, 2019 | Adeline Zhang

Help Net Security – In a new report, NSFOCUS introduced the IP Chain-Gang concept, in which each chain-gang is controlled by a single threat actor or a group of related threat actors and exhibit similar behavior among the various attacks conducted by the same gang. Researchers analyzed attack types, volume, size of events, gang activities, […]