The Future of Data Protection: The Emergence of Confidential Computing In today's information age, data has become an invaluable resource ubiquitous across various sectors, from financial institutions to healthcare and scientific research. However, as data continues to grow, concerns about data privacy and security become increasingly prominent. Incidents of data...
Categoria: Blog
Apache Arrow PyArrow Arbitrary Code Execution Vulnerability (CVS 2023-47248) Notification
Overview Recently, NSFOCUS CERT found that Apache Arrow issued a security notice, which fixed an arbitrary code execution vulnerability in the PyArrow library (CVE-2023-47248). Due to PyArrow reading Arrow IPC, Feather, or Parquet data from untrusted sources, PyExtensionType creates an automatic loading feature that allows for deserialization of data from...
Why Isn’t My ChatGPT Working?
"My ChatGPT isn't working properly." “I can't log in, and it's not responding at all.†Just as OpenAI released a series of new features recently, ChatGPT experienced prolonged service disruptions last Wednesday. Subsequently, OpenAI issued a statement revealing that they were facing periodic outages across ChatGPT and the API due...
What are the differences between DDoS attacks on the application layer and the network layer
The market for services protecting against distributed denial of service attacks, or Anti-DDoS, has a significant focus on mitigating attacks aimed at the network layer of companies' infrastructure. In this type of attack, infected vectors are commonly used to generate requests without the aim of concrete communication, intending to flood...
The New APT Group DarkCasino and the Global Surge in WinRAR 0-Day Exploits
Overview In 2022, NSFOCUS Research Labs revealed a large-scale APT attack campaign called DarkCasino and identified an active and dangerous aggressive threat actor. By continuously tracking and in-depth study of the attacker's activities, NSFOCUS Research Labs has ruled out its link with known APT groups, confirmed its high-level persistent threat...
Software Supply Chain Security Solution – Supply Chain Security Control
Establishing a Software Supply Chain Asset Register An organization's products and services are diverse and complex. By establishing a software supply chain asset register, you can have a clear understanding of the supply chain relationships within your organization. The organization needs to create a comprehensive inventory of suppliers, software, tools,...




