Attack and Defense Around PowerShell Event Logging

February 27, 2019 | NSFOCUS

0x00 Overview PowerShell has been a focus of concern for network defense. The fileless PowerShell, featuring LotL and excellent ease of use, is widely used in various attack scenarios. In order to capture PowerShell-based attacks, an increasing number of security professionals tend to, through PowerShell event log analysis, extract attack records such as post-exploitation data […]

Technical Report on Container Security (IV)

February 27, 2019 | NSFOCUS

Container Security Protection – Application Security Application Security The ecosystem of the container technology is gradually established and various solutions become available in specific segments of containers, both of which lay a solid foundation for the container deployment. On the basis of the enterprise container deployment, the emergence of business processes revolving around container applications, […]

ADB.Mirai: New Mirai Botnet Variant Spreading via the ADB Debug Port

February 26, 2019 | NSFOCUS

Overview At the beginning of 2019, the domestic and overseas security vendors have detected cryptominers that spread via Android devices with an open ADB debug port. Recently, NSFOCUS Fu Ying Labs has detected once more such botnets that can be used to launch distributed denial-of-service (DDoS) attacks. The sample analysis suggests that this botnet family […]

NSFOCUS APPOINTS CHUI CHUN FAI AS PRINCIPAL ARCHITECT

February 25, 2019 | NSFOCUS

Chui brings over 20 years of experience to the role, and will work closely with customers to ensure optimal deployment of their network security solutions SINGAPORE, February 19, 2019 – NSFOCUS, a leader in holistic hybrid security solutions, today announced the appointment of Chui Chun Fai as Principal Architect for Asia Pacific, where he is […]

Genius? Lunatic? Maybe Both (III)

February 25, 2019 | NSFOCUS

Today, people live in a connected world. No matter how far away they are from one another, the Internet can bring them together, talking face to face in cyberspace. The prevalence of big data and the super powerful computing capability of machines herald a golden era of artificial intelligence, known as “the third wave”. New […]

IP Reputation Report-02222019

February 22, 2019 | NSFOCUS

Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at February 22, 2019.

WinRAR Code Execution Vulnerability Threat Alert

February 21, 2019 | NSFOCUS

1 Vulnerability Overview Recently, a security researcher found a logical bug in WinRAR using the WinAFL fuzzer and exploited it to gain full control over a victim’s computer. An attacker could exploit this vulnerability by crafting an archive and then tricking victims into downloading it by means of a phishing email, net disk, or forum. […]

Microsoft Security Bulletin for February 2019 Patches That Fix 79 Security Vulnerabilities

February 21, 2019 | NSFOCUS

Overview Microsoft released the January 2019 security patch on Tuesday that fixes 79 vulnerabilities ranging from simple spoofing attacks to remote code execution in various products, including .NET Framework, Adobe Flash Player, Azure, Internet Explorer, Microsoft Browsers, Microsoft Edge, Microsoft Exchange Server, Microsoft Graphics Component, Microsoft JET Database Engine, Microsoft Office, Microsoft Office SharePoint, Microsoft […]

Data Manipulation: The Next Level of Cyberattacks

February 20, 2019 | NSFOCUS

Channel Futures – Today cyberattacks aim to steal information or hijack infrastructure. While these threats are damaging enough, nation states and bad actors are not resting on their laurels. Next up in their nasty bag of tricks is blowing a hole in data integrity via unauthorized data changes, planting false information, changing sensor reads, and […]

Technical Report on Container Security (IV)-7

February 20, 2019 | NSFOCUS

Container Security Protection – Orchestration Security Orchestration Security The maturity of the container technology pushes the development and implementation of microservices. More and more enterprises choose to adopt a mircoservice architecture to build their applications. Container orchestration tools are responsible for managing container clusters that carry various services. Arguably, it is container orchestration tools that […]

Search

Subscribe to the NSFOCUS Blog