Background NSFOCUS researchers detected a code poisoning attack against vulnerability researchers and red team members recently. Attackers use implanted malicious programs in multiple code repositories under the cover of two highly exploitable vulnerabilities of Linux and VMware exposed this year. Once a user downloads the code and compiles it locally,...
Categoria: Blog
Good News! NSFOCUS Named as a Representative Vendor in Gartner® Market Guide for Security Orchestration, Automation and Response Solutions Again
Santa Clara, Calif. July 4, 2023 – We are thrilled to announce that NSFOCUS has been included as a Representative Vendor in Gartner Market Guide for Security Orchestration, Automation and Response Solutions again. It is the 2nd consecutive year for NSFOCUS to be listed in this report. This report provides...
Grafana Identity Authentication Bypass Vulnerability (CVS 2023-3128) Notification
Overview Recently, NSFOCUS CERT detected a vulnerability in Grafana's authentication bypass (CVE-2023-3128). Azure AD can support multiple users with the same email address. When configuring Azure AD to support multiple users, unauthenticated attackers can exploit this vulnerability by creating malicious email account requests. Due to Grafana's failure to uniquely authenticate...
VMware vCenter Server Multiple High Risk Vulnerabilities Notification
Overview Recently, NSFOCUS CERT found that VMware's official security announcement disclosed multiple vulnerabilities in VMware vCenter Server, which could be used by attackers to cause remote code execution, cross-border write and read, etc. Currently, the official version has been updated and fixed. Affected users should take protective measures as soon...
An Insight into RSA 2023: Using AI to Synthesize De-identified Data
At the 2023 RSA conference, CISO and researchers from Virginia's Department of Behavioral Health and Developmental Services shared a topic entitled " Rise of the Machines: Achieving Data Security and Analytics with AI". They proposed the use of artificial intelligence to rapidly synthesize "de-identified" data, thus avoiding significant resource consumption...
Fortinet FortiNAC Remote Code Execution Vulnerability (CVS 2023-33299) Notification
Overview Recently, NSFOCUS CERT monitored that Fortinet officially fixed a Fortinet FortinaC remote code execution vulnerability (CVE-2023-33299). Unauthenticated remote attackers can exploit this vulnerability by sending a customized request to the service running on TCP port 1050, and an attacker who successfully exploits this vulnerability can execute arbitrary code on...





