HTTP/2 Protection in ADS R90F03

HTTP/2 Protection in ADS R90F03

| | ads
Function Description For HTTPS application layer protection, ADS establishes a TLS connection with a client in replace of the server, and then authenticates the client through the application-layer protocol HTTP. If the client properly responds to the HTTP packet from ADS, ADS deems this client reliable and will add it ... Read More
Two Use Cases of NSFOCUS AISecOps

NSFOCUS AISecOps: Elevating Your Security Operations Efficacy and Mitigating Alert Fatigue

| | Blog, NSFOCUS ISOP
In the realm of security operations, enterprises often face challenges such as a high volume of alerts, an inability to pinpoint real threats, insufficient security knowledge, and a lack of operational staff. While the operational platforms of major security firms exhibit similarities in functionality, some companies diligently analyze customer pain ... Read More
Six Algorithms for Defending Against the Novel “HTTP/2 Rapid Reset” DDoS Attack

Six Algorithms for Defending Against the Novel “HTTP/2 Rapid Reset” DDoS Attack

| | Blog, DDoS attack, HTTP/2 Rapid Reset
A recently discovered HTTP/2 protocol-based Distributed-Denial-of-Service (DDoS) vulnerability has been identified by multiple cloud service providers. This vulnerability enables attackers to achieve an unprecedented record of 398 million requests per second. This vulnerability has been identified as CVE-2023-44487, potentially making it one of the largest layer 7 DDoS attacks ever ... Read More
NSFOCUS Launches CTEM Offerings to Mitigate Threat Exposure

NSFOCUS Launches CTEM Offerings to Mitigate Threat Exposure

| | Blog, CTEM, Press Releases
NSFOCUS CTEM Offerings: A Comprehensive Solution to Enhance Your Security Posture Singapore – October 17, 2023 – NSFOCUS, a globally recognized leader in cybersecurity solutions, is pleased to announce a comprehensive suite of security offerings designed to enhance the Continuous Threat Exposure Management (CTEM) program for organizations of all sizes ... Read More
APT Group DarkPink Exploits WinRAR 0-Day to Target Multiple Entities in Vietnam and Malaysia

APT Group DarkPink Exploits WinRAR 0-Day to Target Multiple Entities in Vietnam and Malaysia

| | APT group, Blog
Overview NSFOCUS Security Labs has been continuously monitoring the newly discovered WinRAR 0-day vulnerability, CVE-2023-38831. It has come to our attention that the advanced persistent threat group known as DarkPink has recently begun exploiting this vulnerability to target government entities in Vietnam and Malaysia. In this round of attack activities, ... Read More

Countdown to GovWare 2023 – The Application of Artificial Intelligence (AI) in Cybersecurity

| | Blog, events
The stage is set, and the countdown has begun. GovWare 2023, a pivotal event in cybersecurity, is just around the corner. From a thorough review of the event agenda, we discerned that many speeches, keynotes and panels will be centered around the application of Artificial Intelligence (AI) in cybersecurity. As ... Read More

Microsoft’s October security update for multiple high-risk product vulnerabilities

Overview On October 11, NSFOCUS CERT monitored that Microsoft had released a security update patch for October, fixing 104 security problems, involving Microsoft WordPad, Skype for Business, Windows Layer 2 Tunneling Protocol, Microsoft Message Queuing and other widely used products, including high-risk vulnerability types such as privilege enhancement, remote code ... Read More

curl SOCKS5 Heap Overflow Vulnerability (CVC-2023-38545) Notification

Overview Recently, NSFOCUS monitored curl’s official security announcement, which fixed the SOCKS5 heap buffer overflow vulnerability (CVE-2023-38545) and cookie injection vulnerability (CVE-2023-38546). The details of the vulnerability have been made public. Affected users should upgrade curl as soon as possible. SOCKS5 Heap Buffer Overflow Vulnerability (CVS 2023-38545) When curl is ... Read More

Exim Remote Code Execution Vulnerability (CVS 2023-42115) Notification

Overview Recently, NSFOCUS CERT detected an Exim remote code execution vulnerability (CVE-2023-42115). When external authentication is enabled, due to improper user input verification, an unauthenticated attacker can remotely exploit this vulnerability by writing data beyond the bounds, ultimately executing arbitrary code on the target server. At present, the details of ... Read More
Automated and Manual Backup Procedures for ADS, ADSM and NTA

Automated and Manual Backup Procedures for ADS, ADSM and NTA

| | ads, ADSM, DDoS attack, NTA
Configuration backup is important in many scenarios: Next, we will provide a step-by-step guide on performing configuration backup individually for ADS, ADSM, and NTA. ADS ADS supports one-click export of the current configuration. Click Export on ADS System > Local Settings > Configuration File Management to download configuration files directly: ... Read More
Loading...