Good News! NSFOCUS Named as a Representative Vendor in Gartner® Market Guide for Security Orchestration, Automation and Response Solutions Again

Santa Clara, Calif. July 4, 2023 – We are thrilled to announce that NSFOCUS has been included as a Representative Vendor in Gartner Market Guide for Security Orchestration, Automation and Response Solutions again. It is the 2nd consecutive year for NSFOCUS to be listed in this report. This report provides...

Grafana Identity Authentication Bypass Vulnerability (CVS 2023-3128) Notification

Overview Recently, NSFOCUS CERT detected a vulnerability in Grafana's authentication bypass (CVE-2023-3128). Azure AD can support multiple users with the same email address. When configuring Azure AD to support multiple users, unauthenticated attackers can exploit this vulnerability by creating malicious email account requests. Due to Grafana's failure to uniquely authenticate...

VMware vCenter Server Multiple High Risk Vulnerabilities Notification

Overview Recently, NSFOCUS CERT found that VMware's official security announcement disclosed multiple vulnerabilities in VMware vCenter Server, which could be used by attackers to cause remote code execution, cross-border write and read, etc. Currently, the official version has been updated and fixed. Affected users should take protective measures as soon...

An Insight into RSA 2023: Using AI to Synthesize De-identified Data

At the 2023 RSA conference, CISO and researchers from Virginia's Department of Behavioral Health and Developmental Services shared a topic entitled " Rise of the Machines: Achieving Data Security and Analytics with AI". They proposed the use of artificial intelligence to rapidly synthesize "de-identified" data, thus avoiding significant resource consumption...

Fortinet FortiNAC Remote Code Execution Vulnerability (CVS 2023-33299) Notification

Overview Recently, NSFOCUS CERT monitored that Fortinet officially fixed a Fortinet FortinaC remote code execution vulnerability (CVE-2023-33299). Unauthenticated remote attackers can exploit this vulnerability by sending a customized request to the service running on TCP port 1050, and an attacker who successfully exploits this vulnerability can execute arbitrary code on...

NSFOCUS
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.