NSFOCUS Enhances DDoS Protection Capabilities in New Version of Anti-DDoS Products

We’re excited to announce an upcoming upgrade to our NSFOCUS on-premises DDoS protection product suite! The new version of our Anti-DDoS products will further enhance our capabilities to detect and protect against DDoS attacks, empowering our customers to tackle increasingly sophisticated threats. What’s New in Version 4.5R90F06? Enhanced Protection with...

NSFOCUS Exhibits at GovWare 2024

Singapore, October 16, 2024 – NSFOCUS, a global leader in cybersecurity solutions, today exhibits at GovWare 2024, Asia’s premier cyber information and connectivity platform, taking place at Sands Expo and Convention Centre in Singapore. NSFOCUS at GovWare 2024 Founded in 2000, NSFOCUS has built a reputation for deep technical expertise...

A Deep Dive into DDoS Carpet-Bombing Attacks

With the rapid growth of the internet, especially in areas like cloud computing, 5G, and IoT technologies, the scale of botnets continues to expand, intensifying the battle between attack and defense. In response, DDoS attacks have evolved, taking on a more intelligent form to evade security defenses. Traditional DDoS attacks...

Countdown to GovWare 2024: Join NSFOCUS at Booth D05!

As we gear up for GovWare 2024, taking place from October 15 to 17 at the Sands Expo and Convention Centre in Singapore, we are thrilled to invite you to visit NSFOCUS at Booth D05. With just a week to go, the excitement is palpable, and we can’t wait to...

Decoding the Double-Edged Sword: The Role of LLM in Cybersecurity

Large Language Models (LLMs) are essentially language models with a vast number of parameters that have undergone extensive training to understand and process human language. They have been trained on a wide array of texts, enabling them to assist in problem-solving across various domains. Security professionals are also exploring the...

Remote Code Execution Vulnerability Alert of Unix CUPS Print Service (CVE-2024-47076 / CVE-2024-47175 / CVE-2024-47177)

Overview Recently, NSFOCUS CERT monitored the disclosure of the details of remote code execution vulnerabilities for Unix CUPS printing service on the Internet. When the system enables cups-browsed process listening (default port 631) to receive UDP packets, unauthenticated attackers induce victims to configure by constructing a malicious IPP server. When...

NSFOCUS
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.