New Satan Variants Target Financial Sector With Monero Miners and Ransomware

dezembro 21, 2018 | Adeline Zhang

SecurityIntelligence – Researchers spotted two Satan variants targeting organizations in the financial sector with Monero miners and ransomware. The first variant of the malware, which security solutions provider NSFOCUS spotted in early November, targets Linux and Windows systems and spreads by exploiting various application vulnerabilities. After establishing a foothold into a system, the virus simply […]

IP Reputation Report-12212018

dezembro 21, 2018 | Adeline Zhang

Top 10 countries: The above diagram shows the top 10 regions with most malicious IP addresses from the NSFOCUS IP Reputation databases at December 21, 2018. But the United States has the largest allocated IP addresses in the world and China is in the second place. So, report IP Reputation as a percentage of total […]

NSFOCUS’s Presence at Botconf 2018

dezembro 17, 2018 | Adeline Zhang

On December 7, 2018 security experts from NSFOCUS Fu Ying Labs delivered a speech at Botconf 2018, presenting WASM security threat analysis technologies with researchers from security firms, media personnel, and security practitioners from CERTs (Computer Emergency Response Teams) of various countries. Their striking insights were highly accepted and acknowledged by the international security industry. […]

ThinkPHP Remote Code Execution Vulnerability Handling Guide

dezembro 17, 2018 | Adeline Zhang

1 Vulnerability Overview Recently, ThinkPHP posted a blog, announcing the release of an update that addresses a high-risk remote code execution (RCE) vulnerability. This vulnerability stems from the framework’s insufficient checks on controller names, which, in case forced routing is not enabled, would allow arbitrary code execution or even access to the server. ThinkPHP is […]

Personal Computer——File Deletion

dezembro 14, 2018 | Adeline Zhang

Case AnalysisCase Analysis When you delete files from a computer or USB flash drive, just clicking the deletion button or doing a quick formatting does not completely remove files because you can easily recover them using data recovery software. Even after you clear the recycle bin, those deleted files can still be retrieved.

NSFOCUS 2019 Predictions: Email Attachments, IoT, and Cryptominers to be Security Pain Points in 2019

dezembro 13, 2018 | Adeline Zhang

VMblog.com – It’s no surprise that 2018 continued to bring an increase in fraud attacks and data security breaches, including those of Facebook and now Marriott. In the past two years, the average number of overall daily searches for keywords such as “personal information disclosure” and “hacker” have been fluctuating at a very high level. […]

ThinkPHP 5.x Remote Code Execution Vulnerability Threat Alert

dezembro 13, 2018 | Adeline Zhang

Overview Recently, ThinkPHP posted a blog, announcing the release of an important update that addresses a critical vulnerability. This security update fixes a getShell vulnerability caused by the framework’s insufficient checks on controller names in case forced routing is not enabled. The vulnerability, which affects ThinkPHP 5.0 and 5.1, is fixed in the latest version.

The missing leg – integrity in the CIA triad

dezembro 13, 2018 | wangyang2

Linkedin Eric Vanderburg Information security is often described using the CIA Triad. The CIA stands for Confidentiality, Integrity, and Availability and these are the three elements of data that information security tries to protect. If we look at the CIA triad from the attacker’s viewpoint, they would seek to compromise confidentiality by stealing data, integrity by manipulating data […]

Technical Report on Container Security (III)-2

dezembro 11, 2018 | Adeline Zhang

Security Risks and Challenges—Security Threat Analysis Security Threat Analysis When we talk about security risks to containers, we mean security threats to hosts, to containers, and to the carried applications.

Adobe Flash Player 0-Day Vulnerabilities Threat Alert

dezembro 11, 2018 | Adeline Zhang

Overview On December 5, 2018, local time, Adobe released a security bulletin to document the remediation of two vulnerabilities, namely a critical 0-day vulnerability (CVE-2018-15982) in Adobe Flash Player and an important vulnerability (CVE-2018-15983) in Adobe Flash Player installer.

Procurar