Research & Reports

NSFOCUS Releases IP Chain Gang Report on Behavior of Recidivist Hackers

January 30, 2019 | Adeline Zhang

  In a new report, NSFOCUS introduced the IP Chain-Gang concept, in which each chain-gang is controlled by a single threat actor or a group of related threat actors that exhibit similar behavior among the various attacks conducted by the same gang. The report analyzes the IP Chain-Gangs attack types, volume, size of events, gang […]

Technical Report on Container Security (IV)-5

January 30, 2019 | Adeline Zhang

Container Security Protection – Container Network Security Container Network Security

IP Reputation Report-01252019

January 25, 2019 | Adeline Zhang

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 25, 2019. CN increased 1% from 43% to 44% and US stayed at 12% from last week.

Technical Report on Container Security (IV)-4

January 24, 2019 | Adeline Zhang

Container Security Protection – Image Security Image Security Images are the basis of containers. Therefore, their security speaks a lot for that of the entire container ecosystem. Container images are a series of images stacked layer by layer. They are distributed and updated through image repositories. The following sections describe how to secure images from […]

IP Reputation Report-01182019

January 18, 2019 | Adeline Zhang

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 18, 2019. CN dropped from 51% to 43% and US increased from 9% to 12% from last week. Top 10 countries in attack percentage: From the diagram […]

Technical Report on Container Security (IV)-3

January 16, 2019 | Adeline Zhang

Container Security Protection – Host Security Host Security Hardening of Basic Host Security Containers share the operating system kernel with the host. Therefore, host configuration determines whether containers can be executed in a secure manner. For example, vulnerable software puts the host at risk of arbitrary code execution; opening ports at will exposes the host […]

IP Reputation Report-01112019

January 11, 2019 | Adeline Zhang

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 11, 2019. Top 10 countries in attack percentage: From the diagram above, we can see the region Palestinian Territory has the biggest percentage of malicious IPs. The […]

Technical Report on Container Security (IV)-2

January 8, 2019 | Adeline Zhang

Container Security Protection – Container Service Security Container Service Security The security of the container management and orchestration service has a direct bearing on that of the container control plane. Take Docker for example. Whether the Docker daemon is properly configured determines the security of Docker to some extent. It is recommended that the following […]

Technical Report on Container Security (IV)-1

January 7, 2019 | Adeline Zhang

Container Security Protection—Linux Kernel Security Mechanism As a lightweight virtualized implementation, the container technology took into account security factors at the time of design, which constitute an important basis for container security protection. This chapter describes security risks and threats facing containers and common protection ideas and methods.

IP Reputation Report-01042019

January 4, 2019 | Adeline Zhang

Top 10 c¿ountries: The above diagram shows the top 10 regions with most malicious IP addresses from the NSFOCUS IP Reputation databases at January 04, 2019.