Research & Reports

Cybersecurity Insights-13

January 16, 2020 | Adeline Zhang

Distribution of IoT-based Family Samples We analyzed IoT-based malicious family samples captured by NSFOCUS threat hunting systems (see Figure 7-1), those captured by NSFOCUS Threat Intelligence (NTI) and those captured by VirusTotal (see Figure 7-2). The two figures, though presenting different data sources, both indicate that Gafgyt and Mirai take the first two places on […]

IP Reputation Report-01122020

January 15, 2020 | Adeline Zhang

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 12, 2020.

ICS Information Security Assurance Framework 2

January 14, 2020 | Adeline Zhang

1.2 Development of ICS Information Security As industrial informatization advances at a rapid pace and the industrial Internet, industrial clouds, and other new technologies spring up, information and network technologies and IoT technologies have found wide application in smart grid systems, intelligent transportation systems, and industrial production systems. For the sake of inter-system collaboration and […]

ICS Information Security Assurance Framework 1

January 13, 2020 | Adeline Zhang

Development of ICS Security 1.1 Development of Industrial Intelligence The following figure shows the development history of industrial control systems (ICSs). The history of ICSs can date back to the 18th century when James Watt improved the steam engine by adding a throttling controller, i.e., a centrifugal governor. The centrifugal governor works like this: It […]

Cybersecurity Insights-12

January 9, 2020 | Adeline Zhang

6.3 Worm In the 2018 H1 Cybersecurity Insights , we pointed out that most worm viruses were discovered more than five years ago. This indicates how capable these viruses are of propagating and evolving and how difficult it is to remove them completely from the network. According to data throughout the year, this was still […]

IP Reputation Report-12292019

January 8, 2020 | Adeline Zhang

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 5, 2020.

IP Reputation Report-12292019

January 3, 2020 | Adeline Zhang

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at December 29, 2019.

Cybersecurity Insights-11

January 1, 2020 | Adeline Zhang

Backdoor, cryptominer, worm, trojan, and zombie115 made the list of active most malware in 2018. Strains of backdoors malware are still extremely active because they are too stealthy to be easily detected. As the virtual currency market continues to shrink, cryptomining is less popular than before, but still very active, coming second behind backdoors.

IP Reputation Report-12232019

December 26, 2019 | Adeline Zhang

 Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at December 23, 2019.

Cybersecurity Insights-10

December 25, 2019 | Adeline Zhang

5.3.2 Attack Type Distribution In 2018, the most frequent attacks seen814 were SYN flood, UDP flood, ACK flood, HTTP flood and HTTPS flood attacks, which altogether accounted for 96% of all DDoS attacks. In contrast, reflection attackers contributed to no more than 3% of attacks. Compared with 2017, the year 2018 witnessed a 80% decrease […]