Blog
Modern DDoS Attacks and the Rise of DDoS Coalitions
DDoS attacks have become an indispensable weapon to paralyze network systems in cyber warfare. Emerging DDoS attacks, such as HTTP/2 Rapid Reset and SLP reflection amplification attacks, are constantly emerging. Both attackers ...
Unearthing Identity Threat Exposures
Organizations must navigate through a tumultuous sea of cybersecurity threats today. As businesses increasingly transition to the cloud and embrace remote work, the complexity of managing digital identities has exponentially grown, unveiling ...
Webinar Recap: Cybersecurity Trends to Watch in 2024
Predicting the future of cybersecurity is an impossible task, but getting some expert advice doesn’t ...
10 Questions to Ask SIEM Providers
Discover the essential questions to ask SIEM providers. Ensure you choose the right SIEM provider and solution with our comprehensive guide for effective cybersecurity. The post 10 Questions to Ask SIEM Providers ...
The 11 Best GRC Tools for 2024
With so many GRC tools available, figuring out which suits your organization can be challenging. Governance, Risk, and Compliance (GRC) platforms help organizations optimize their governance strategies, streamline risk management processes, and ...
Ethics of Cyber Security: To Disclose or Not?Â
In a recent panel discussion, a thought-provoking question was posed to us, one that delves into the murky waters of cyber security and governmental responsibility. The query centered on the obligation of ...
XZ Utils Backdoor Vulnerability (CVE-2024-3094) Advisory
Overview NSFOCUS CERT recently detected that a backdoor vulnerability in XZ Utils (CVE-2024-3094) was disclosed from the security community, with a CVSS score of 10. Because the SSH underlying layer relies on ...
Linux Kernel Privilege Escalation Vulnerability (CVE-2024-1086) Alert
NSFOCUS CERT has detected that details and a proof-of-concept (PoC) tool for a Linux kernel privilege escalation vulnerability CVE-2024-1086, have been publicly disclosed recently. Due to a use-after-free vulnerability in the netfilter: ...
The Importance of User Roles and Permissions in Cybersecurity Software
How many people would you trust with your house keys? Chances are, you have a ...
Android Supply Chain Validation Cheat Sheet
Several different tools and techniques are available for Android to enumerate software and configurations, allowing you to begin to validate the software on devices. This cheat sheet is based on the work ...