Overview Recently, NSFOCUS CERT found that Fortinet has officially fixed a remote code execution vulnerability in FortiOS SSL VPN (CVS-2023-27997). Due to the heap-based Buffer overflow error in SSL VPN, an unauthenticated attacker can trigger the vulnerability by sending a specially crafted packet, which can ultimately enable the execution of...
Categoria: Blog
Turkey Companies Targeted by RedBeard with Phishing Attacks
I. Summary Recently, NSFOCUS Security Labs observed some phishing attacks targeting Turkish companies, including the Turkish industrial group Borusan Holding, communication operator Turkcell, bank Vakıf Katılım, and online lottery service company Nesine. The attacker placed different types of phishing documents and new Trojan programs in this group of activities to...
Nacos Raft Protocol Deserialization Code Execution Vulnerability
Overview Recently, NSFOCUS CERT found that there was a deserialization vulnerability in Nacos's Raft protocol. Due to the Nacos cluster's unrestricted use of Hessian for deserialization when processing some Jraft requests, attackers can execute code. Affected users should take protective measures as soon as possible. Vulnerability DetailsVulnerability PoCVulnerability EXPUtilization in...
An Insight into RSAC 2023: Lateral Movement in Kubernetes
At the RSA Conference 2023, Yossi Weizman, Senior Security Researcher at Microsoft Defender for Cloud, shared with us the lateral movement of the Kubernetes (aka K8s) cluster and its impact on the cloud environment. Based on Yossi's speech and NSFOCUS researchers’ understanding, this paper describes the use of lateral movement...
An Insight into RSAC 2023: 6 Keywords of RSAC 2023
Keyword 1: Stronger Together Alone we can do so little; together we can do so much." - Helen Keller The theme of this year's conference is "Stronger Together". What does "Stronger" mean? What is the specific scope to be “Together”? “Stronger" refers to the ability of the business itself to...
NSFOCUS Lua-based Anti-DDoS Solution
Limitations of Pre-configured DDoS Protection Policies Lots of organizations have realized that DDoS defense is critical to the availability of network infrastructure. But most Anti-DDoS solutions in the market still rely on pre-configured protection policies with multiple threshold options to offer multi-layered protection at different levels. However, this approach has...




