Attack Gang Size Gang Size Figure 3-27 shows the distribution of our identified IP gangs by size. Two gangs consist of over 10,000 members and the largest gang has 88,000 members. (mais…)
Blog
Jenkins Plug-in Multiple Vulnerabilities Threat Alert
Vulnerability Description On May 6, Jenkins released a security bulletin to announce the fix of nine vulnerabilities in five plug-ins. The SCM Filter Jervis plug-in contains a remote code execution vulnerability (CVE-2020-2189) which is officially identified as high-risk. As the SCM Filter Jervis plug-in does not configure its YAML parser...
Adobe Out-of-Band Patch Tackling Critical Vulnerabilities in Multiple Products Threat Alert
Overview On April 28, local time, Adobe released an out-of-band patch tackling multiple vulnerabilities in Magento, Adobe Illustrator, and Adobe Bridge. For details about the security bulletins and advisories, visit the following link: https://helpx.adobe.com/security.html (mais…)
Information Security in the Workplace- Print of Documents at a Print Shop-v
With the advancement of IT-based transformation and the rapid development of IT, various network technologies have seen more extensive and profound applications, along with which come a multitude of cyber security issues. Come to find out what information security issues you should beware of in the workplace. (mais…)
IP Reputation Report-05032020
Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at May 3, 2020. Top 10 countries in attack percentage: The Belarus is in first place.The Cape Verde is in the second place.The country...
DDoS Attack Landscape 6
Activity of Attack Sources Ongoing monitoring of attack sources reveals that 90% of them were active for no longer than 10 days. There were two reasons behind this. For one thing, in order to keep attack sources freshand prevent them from being blacklisted by defenders, attackers tended to use the...




