NSFOCUS

Introduction to ADS’s HTTP Keyword Checking Policy

agosto 29, 2023

HTTP Keyword Checking is a process by which ADS controls HTTP traffic through the ADS device. In addition, ADS takes a specific action (Accept, Drop, Disconnect, Add to blacklist, Add to whitelist, or Limit rate) as configured on passing packets whose source IP address and specific fields match the HTTP Keyword Checking rule. HTTP Keyword […]

Mastering Defense and Understanding Offense: Approach of Detecting Abnormal Attack Behaviors

agosto 29, 2023

In offensive and defensive exercises, attackers will use various attack methods to maximize their objectives, including not only common attack methods but also complex attacks. Phishing email is popular among attackers as the most commonly used and low-cost attack method. Attackers typically use a variety of techniques and deception to send emails with malicious attachments […]

Workshop – Empowering Your Organization with Cybersecurity

agosto 18, 2023

Empowering Your Organization with Cybersecurity, Aug 17, 2023, Thailand. NSFOCUS Thailand team joined the partner event organized by Ingram Micro, introducing our product portfolio. With the increasing threats of #cyberattacks, more and more organizations recognized the need to implement a robust and reliable solution to protect the network from disruption.

Path Traversal Attack Protection

agosto 18, 2023

A path traversal attack, or directory traversal, aims to access files and directories stored outside the web root folder. When the server does not check the user input strictly, by manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary […]

From Ripples to Waves: The Swift Evolution of the “Boat” Botnet

agosto 18, 2023

The botnet family “Boat” was first discovered by NSFOCUS Security Labs in June 2022. Its name comes from the fact that malicious samples in its early versions propagate with the file name “boat”. At the same time, since some malicious samples in later versions of this family retain symbolic information and there are a large […]

How to Achieve Sensitive Data Unlearning for Machine Learning Models?

agosto 11, 2023

As machine learning is increasingly used in data analysis in cybersecurity, there is a risk of privacy disclosure to some extent if models inadvertently capture sensitive information from training data. Since training data will exist in the model parameters for a long time, it is possible to directly output training samples if some data with […]

Blacklist Function Optimization on ADS R90F03

agosto 11, 2023

ADS R90F03 refactors the blacklist function. You can configure group-specific blacklist rules, and blacklists of different groups take effect independently. Besides, you can use a global blacklist to make related rules and blocked addresses take effect for all groups. Blacklist Introduction on ADS The blacklist function in ADS before R90F03 has the following features: ADS […]

KmsdBot: A Customized Botnet Family with DDoS and Mining Capabilities

Uma imagem que ilustra um hacker mexendo em um notebook.

agosto 7, 2023

I. Overview NSFOCUS Security Labs recently detected that a new botnet family KmsdBot, which combines DDoS and mining functions, has become active again. Attackers continue to replace C&C infrastructure and update Trojan versions. Compared with the traditional botnet-like family, KmsdBot adopts a brand-new architecture and is developed in the Go programming language. The simplicity, high […]

Cyber Heist – Cyber Madness 2023

agosto 5, 2023

Cyber Heist, Aug 1-2, 2023, The Globe Tower in BGC, Taguig City, Philippines. This event aims to raise awareness of common cybersecurity threats by immersing the attendees in simulations of cybersecurity breach scenarios. Our experts discussed with audiences about the best course of action in real-world scenarios, and showcased our security solution with live demos.

Metabase Remote Code Execution Vulnerability (CVS 2023-37470)

agosto 3, 2023

Overview Recently, NSFOCUS CERT detected a remote code execution vulnerability in Metabase (CVE-2023-37470). Due to a flaw in the vulnerability fix for CVS 2023 38646, attackers can achieve remote code execution through H2 connection string injection. Affected users should take protective measures as soon as possible. Reference link: https://github.com/metabase/metabase/security/advisories/GHSA-p7w3-9m58-rq83 Scope of Impact Affected version Open […]

Search

Inscreva-se no Blog da NSFOCUS