NSFOCUS

From Ripples to Waves: The Swift Evolution of the “Boat” Botnet

agosto 18, 2023

The botnet family “Boat” was first discovered by NSFOCUS Security Labs in June 2022. Its name comes from the fact that malicious samples in its early versions propagate with the file name “boat”. At the same time, since some malicious samples in later versions of this family retain symbolic information and there are a large […]

How to Achieve Sensitive Data Unlearning for Machine Learning Models?

agosto 11, 2023

As machine learning is increasingly used in data analysis in cybersecurity, there is a risk of privacy disclosure to some extent if models inadvertently capture sensitive information from training data. Since training data will exist in the model parameters for a long time, it is possible to directly output training samples if some data with […]

Blacklist Function Optimization on ADS R90F03

agosto 11, 2023

ADS R90F03 refactors the blacklist function. You can configure group-specific blacklist rules, and blacklists of different groups take effect independently. Besides, you can use a global blacklist to make related rules and blocked addresses take effect for all groups. Blacklist Introduction on ADS The blacklist function in ADS before R90F03 has the following features: ADS […]

KmsdBot: A Customized Botnet Family with DDoS and Mining Capabilities

Uma imagem que ilustra um hacker mexendo em um notebook.

agosto 7, 2023

I. Overview NSFOCUS Security Labs recently detected that a new botnet family KmsdBot, which combines DDoS and mining functions, has become active again. Attackers continue to replace C&C infrastructure and update Trojan versions. Compared with the traditional botnet-like family, KmsdBot adopts a brand-new architecture and is developed in the Go programming language. The simplicity, high […]

Cyber Heist – Cyber Madness 2023

agosto 5, 2023

Cyber Heist, Aug 1-2, 2023, The Globe Tower in BGC, Taguig City, Philippines. This event aims to raise awareness of common cybersecurity threats by immersing the attendees in simulations of cybersecurity breach scenarios. Our experts discussed with audiences about the best course of action in real-world scenarios, and showcased our security solution with live demos.

Metabase Remote Code Execution Vulnerability (CVS 2023-37470)

agosto 3, 2023

Overview Recently, NSFOCUS CERT detected a remote code execution vulnerability in Metabase (CVE-2023-37470). Due to a flaw in the vulnerability fix for CVS 2023 38646, attackers can achieve remote code execution through H2 connection string injection. Affected users should take protective measures as soon as possible. Reference link: https://github.com/metabase/metabase/security/advisories/GHSA-p7w3-9m58-rq83 Scope of Impact Affected version Open […]

“Save” and “Apply” Buttons on ADS Configuration Page

agosto 3, 2023

When working with the ADS, it is important to understand the role of the “Apply ” and “Save” buttons located in the upper-right corner of the configuration pages. Apply: Clicking the “Apply” button will apply and enforce the configuration changes, making them effective in the RAM of the ADS. These changes will take effect immediately […]

NSFOCUS ISOP: XDR Technology Empowered with Strong SOAR Capabilities for Modern SOC

NSFOCUS ISOP

agosto 3, 2023

SANTA CLARA, Calif., Aug 3, 2023 – NSFOCUS, a global provider of intelligent hybrid security solutions, today announced the general availability of NSFOCUS Intelligent Security Operations Platform (ISOP), an innovative security analytics and intelligent operations platform that can streamline the security analyst experience, rejuvenate threat response efficiency and improve security operations productivity. NSFOCUS ISOP was […]

QNAP Multiple Vulnerabilities Notification

agosto 2, 2023

Overview Recently, NSFOCUS CERT monitored that QNAP officially released the QVPN code execution vulnerability and QANP denial-of-service vulnerability. Affected users should take protective measures as soon as possible. VPN Code Execution Vulnerability (CVS 2022-27595): There is a code execution vulnerability in the Windows version of the QVPN client, which can be exploited by authenticated local […]

Metabase Remote Code Execution Vulnerability (CVS 2023-38646) Notification

agosto 1, 2023

Overview Recently, NSFOCUS CERT detected a remote code execution vulnerability in Metabase (CVE-2023-38646). Unauthenticated attackers can successfully exploit this vulnerability to execute arbitrary commands with Metabase server privileges on the target server. Affected users should take protective measures as soon as possible. Reference link: https://www.metabase.com/blog/security-advisory Scope of Impact Affected version Open source version: Enterprise version: […]

Search

Inscreva-se no Blog da NSFOCUS