Blog

Your FAQ Guide to RSA Conference 2024

Here’s your essential FAQ guide for RSA Conference 2024! Whether you’re a first-timer or a seasoned attendee, this guide aims to help you navigate the conference with ease and make the most of your experience. Welcome to stop by our booth #3301 at the South Expo of Moscone Center! Q1:...

NTA and Router SNMP Configuration Example

NTA can monitor the CPU and memory usage, as well as traffic on the router interfaces where SNMP functionality is enabled. We will provide an example to explain the configuration for a better understanding of SNMP setup. Scenario: Configuring SNMP between the NTA management interface (IP: 10.66.249.47) and a switch...

Three Major Challenges Faced by WAF in the Banking Industry

As the digital transformation is deepening, the banking industry is making efforts to build digital banks, open banks, and scenario-based financial business models. On one hand, banks are pushed to pay more attention to online operations and to enhance their openness. On the other hand, this raises higher standards for...

What Happened in Cybersecurity in 2023: A Summary of Security Incidents, Vulnerability Information, and Cybersecurity Trends

The year 2023 witnessed a dynamic and complex cybersecurity landscape, with various security incidents, vulnerabilities, and trends emerging and evolving. Today, we released the 2023 Annual Security Incident Observation Report, based on our security incident data recorded in 2023. This report provides a summary of the security incidents, the security...

NSFOCUS NIPS Brute-Force Protection

A brute-force attack involves systematically attempting every possible combination of letters, numbers, and symbols to discover a password. Websites requiring user authentication are susceptible to such attacks. Attackers may begin with dictionary words or slightly modified versions to expedite the process, exploiting common user password practices. These variations are known...

AI Supply Chain Security: Hugging Face Malicious ML Models

Introduction to Hugging Face Malicious ML Models Background A recent report by JFrog researchers found that some machine learning models on Hugging Face may be used to attack the user environment. These malicious models will lead to code execution when loaded, providing the attacker with the ability to gain full...

NSFOCUS
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.