UC Browser Potential Man-in-the-Middle Vulnerability Threat Alert
abril 2, 2019
Overview
Recently, a foreign researcher discovered a potential vulnerability in the UC browser which may affect hundreds of millions of users around the world. A hidden feature is found in the UC browser to download auxiliary software modules for execution by bypassing some restrictions of an application store. This feature is used to add new functions or install updates to the client, but can also be exploited for man-in-the-middle (MITM) attacks. For example, when a user uses the UC browser to download a PDF file and attempts to open it, an attacker, via an MITM attack, could enable the browser to download a malicious file and finally execute it. (mais…)
PostgreSQL Arbitrary Code Execution Vulnerability (CVE-2019-9193) Threat Alert
abril 1, 2019
1 Vulnerability Overview
Recently, a security researcher disclosed details about a PostgreSQL privilege escalation code execution vulnerability (CVE-2019-9193), which allows attackers with read access to database server-side files to execute arbitrary system commands. (mais…)
Daily Communication——Use of Shared Folders
março 29, 2019
Case Analysis
Public shared folders usually house various documents from different departments, many of which contain sensitive data. Sensitive files reside in such folders mainly because people forget to delete them after copying them, thus exposing sensitive data to intranet hackers and rogue insiders. (mais…)
Apache Tomcat DoS Vulnerability (CVE-2019-0199) Threat Alert
março 28, 2019
1 Vulnerability Overview
Recently, The Apache Software Foundation announced the existence of a denial-of-service (DoS) vulnerability in Apache Tomcat HTTP/2. Specifically, the HTTP/2 implementation accepts streams with excessive numbers of SETTINGS frames and also permits clients to keep streams open without reading/writing request/response data. Thus, too many connection requests from clients can cause server-side thread exhaustion. Successful exploitation of this vulnerability would result in a denial of service on the target. (mais…)
Technical Report on Container Security (V)-3
março 27, 2019
Security Tools – StackRox
-
About StackRox
StackRox features a distributed architecture that collects and analyzes data throughout the application lifecycle to detect and block malicious actors, and finally meet the requirement for protecting containerized cloud-native applications. StackRox delivers continuous detection through its unique combination of distributed sensors and centralized analysis and machine learning to provide context and correlation at the speed and scale of containers. (mais…)
NSFOCUS Attack Threat Monitoring Wins 2019 Cyber Defense Magazine InfoSec Award
março 26, 2019
Earlier this month at RSA we released the newest service in our arsenal of holistic hybrid security solutions, Attack Threat Monitoring (ATM). We were thrilled not only to demo ATM at our RSA booth, but even more pleased to release the service to the public having already won an award. Cyber Defense Magazine examines thousands […]
Adobe Security Bulletins for March 2019 Security Updates Threat Alert
março 26, 2019
Overview
On March 12, 2019 (local time), Adobe released security updates which address multiple vulnerabilities in Adobe Photoshop CC and Adobe Digital Editions. (mais…)
Cisco RV110W, RV130W, and RV215W Routers Web-based Management Interface Remote Code Execution Vulnerability Threat Alert
março 25, 2019
Overview
On February 27 (local time), Cisco officially released a security advisory to announce a critical security vulnerability (CVE-2019-1663) in Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router. This vulnerability exists in the web-based management interface of the preceding products, which fails to properly validate user-supplied data. (mais…)
IP Reputation Report-03222019
março 22, 2019
-
Top 10 countries in attack counts:
- The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at March 22, 2019.
- It’s the first time that Japan got into the top 10 list.
Daily Communication——Release of Code on GitHub
março 21, 2019
Case Analysis
Before compromising a website or system, a hacker usually searches for related information beforehand. Code repositories are a major target. A security-unaware developer may upload code to a public platform, providing an opportunity for hackers to obtain API accounts or security holes by analyzing the uploaded code. (mais…)