Cybersecurity

Unlocking the Future of Cybersecurity: Meet Us at GovWare 2023

September 22, 2023

Today’s ever-evolving digital landscape presents unparalleled opportunities alongside formidable cybersecurity challenges, making the security of organizations’ networks and applications more crucial. As a global network and cyber security leader, we’re excited to invite you to join us at GovWare 2023, a pivotal event held at the Sands Expo and Convention Centre in Singapore from October […]

AISecOps Development Trend

November 10, 2021

As an old saying goes, “Rome was not built in a day”, it is impossible to build AISecOps capabilities simply by following the example of other businesses. In fact, the most topical and mature AI technology is widely applied, but needs to be delved a little deeper. For instance, typical intelligence services like intelligence speech […]

The New Trend of Ransomware: Triple Extortion

August 16, 2021

Threat actors who specialize in ransomware are always using Double Extortion Tactics in which they not only encrypt the victim’s data but also threaten to leak sensitive data publicly unless the ransom is paid. Double Extortion Tactics first started appearing in late 2019, becoming an increasingly common trend through 2020. The attack against Allied Universal […]

2020 H1 Cybersecurity Trends

September 11, 2020

01 Overview of the Vulnerability Trend

In 2020 H1, a total of 1419 vulnerabilities were added to the NSFOCUS Vulnerability Database (NSVD), 714 of which were high-risk vulnerabilities. Among these high-risk vulnerabilities, 184 vulnerabilities were Microsoft-related ones. High-risk vulnerabilities were mainly distributed in major products of Microsoft, Oracle, Adobe, Google, Cisco, IBM, Moxa, Apache, etc.

Note: The NSFOCUS Vulnerability Database (NSVD) contains application vulnerabilities, security product vulnerabilities, operating system vulnerabilities, database vulnerabilities, and network device vulnerabilities.

(more…)

2019 Cybersecurity Insights -3

June 24, 2020

Overall Situation Attack Type Distribution In terms of attack types 1, DDoS attracted the largest proportion (35%) of malicious IP addresses. Other types that malicious IP addresses were most interested in included spam, botnets, and scanning. Of all malicious IP addresses, 15% exploited more than one attack vector. According to our observation of such IP […]

Search

Subscribe to the NSFOCUS Blog