We’re excited to announce an upcoming upgrade to our NSFOCUS on-premises DDoS protection product suite! The new version of our Anti-DDoS products will further enhance our capabilities to detect and protect against DDoS attacks, empowering our customers to tackle increasingly sophisticated threats. What’s New in Version 4.5R90F06? Enhanced Protection with...
Ano: 2024
NSFOCUS Exhibits at GovWare 2024
Singapore, October 16, 2024 – NSFOCUS, a global leader in cybersecurity solutions, today exhibits at GovWare 2024, Asia’s premier cyber information and connectivity platform, taking place at Sands Expo and Convention Centre in Singapore. NSFOCUS at GovWare 2024 Founded in 2000, NSFOCUS has built a reputation for deep technical expertise...
A Deep Dive into DDoS Carpet-Bombing Attacks
With the rapid growth of the internet, especially in areas like cloud computing, 5G, and IoT technologies, the scale of botnets continues to expand, intensifying the battle between attack and defense. In response, DDoS attacks have evolved, taking on a more intelligent form to evade security defenses. Traditional DDoS attacks...
Countdown to GovWare 2024: Join NSFOCUS at Booth D05!
As we gear up for GovWare 2024, taking place from October 15 to 17 at the Sands Expo and Convention Centre in Singapore, we are thrilled to invite you to visit NSFOCUS at Booth D05. With just a week to go, the excitement is palpable, and we can’t wait to...
Decoding the Double-Edged Sword: The Role of LLM in Cybersecurity
Large Language Models (LLMs) are essentially language models with a vast number of parameters that have undergone extensive training to understand and process human language. They have been trained on a wide array of texts, enabling them to assist in problem-solving across various domains. Security professionals are also exploring the...
Remote Code Execution Vulnerability Alert of Unix CUPS Print Service (CVE-2024-47076 / CVE-2024-47175 / CVE-2024-47177)
Overview Recently, NSFOCUS CERT monitored the disclosure of the details of remote code execution vulnerabilities for Unix CUPS printing service on the Internet. When the system enables cups-browsed process listening (default port 631) to receive UDP packets, unauthenticated attackers induce victims to configure by constructing a malicious IPP server. When...

