NSFOCUS has been recognized as one of the Representative Vendors in the Report of Tool: Vendor Identification for Data Loss Prevention 2022 1. The COVID-19 pandemic has accelerated the process of digital transformation. With the vigorous development of digital economy and information industry, the rapid implementation and application of 5G,...
Categoria: Blog
NSFOCUS Recognized by Gartner in Hype Cycle for Security in China, 2022
Gartner® recently published the report of Hype Cycle™ for Security in China, 2022. NSFOCUS has been named a Sample Vendor for situational awareness and 7 other technologies, which NSFOCUS believes validates its innovation and latest practice in security management and situational awareness. According to the report, “situational awareness (SA) technologies...
Citrix Gateway and Citrix ADC Authentication Bypass Vulnerability (CVE-2022-27510) Alert
Overview Recently, NSFOCUS CERT detected that Citrix released a security notice, fixing an authentication bypass vulnerability (CVE-2022-27510). When Citrix Gateway is running with Citrix ADC as a gateway device (either using the SSL VPN feature or deployed as an ICA proxy with authentication enabled), an unauthenticated remote attacker can send...
YApi mongo Injection Vulnerability Alert
Overview Recently, NSFOCUS CERT detected that an open source API interface management platform YApi mongo injection vulnerability was publicly released on the Internet. Due to the splicing of a certain function in YApi, MongoDB injection can be realized. Unauthenticated remote attackers can exploit this vulnerability to obtain the user token...
NSFOCUS Gains CREST Accreditation for Penetration Test Service
Santa Clara, Calif. November 10, 2022  – NSFOCUS, a global provider of intelligent hybrid security solutions, today announced it has received CREST’s internationally recognized accreditation for its Penetration Test services, an addition to its existing accreditation for the vulnerability assessment service.  CREST uses a rigorous quality assurance process to ensure its member...
The Increasing Trend of Software Supply Chain Attacks
Compared with traditional security threats, supply chain threats have a spreading influence. Vulnerabilities of upstream products will affect all downstream roles, causing security risks to spread along the supply chain and consequently expanding the attack area. In recent years, several influential supply chain attacks have taken place, involving open-source components,...





