Protecting Your Assets Against Invisible Stealth Attacks

Malware is becoming increasingly sophisticated in concealing itself, lurking in places in your network, servers and endpoints to deliberately avoid detection by traditional anti-virus tools and signature-based inspection. Stealth viruses can self-modify, or hide outside the OS, or in data, memory, partitions and bootsectors. They may hide quietly for months before launching an attack. This…

Vulnerability Notification: Remote Desktop Services Remote Code Execution

[Overview] Remote Desktop Services (RDS) is one of the components of Microsoft Windows that allow users to remotely access and take control of a computer or virtual machine. Recently, the Remote Desktop Services Remote Code Execution vulnerability was published officially. [Vulnerability Details] CVE-2019-0708: The vulnerability is pre-authentication and requires no user interaction. A remote attacker…

Announcing the New Future-Oriented Data Center Firewall X9180!

The Hillstone X10800 has been proved to be a successful platform. Today, we are excited to announce the release of the X9180 Data Center Firewall that shares the same innovative, fully distributed architecture as the X10800, with smaller form factor, but even more efficiency. The X9180 is a flexible option for data centers customers in…

Wikileaks, Assange and Cyber Security

WikiLeaks founder Julian Assange was arrested at the Ecuadorian Embassy in London after Ecuador withdrew their asylum status after seven years. In response to the arrest, activist communities launched several attacks against the Ecuadorean government. Yesterday, Ecuador confirmed that over 40 million cyberattacks have hit public institutions in response to the arrest of Julian Assange….

Modernize the Log Management with Hillstone Security Audit Platform (HSA)

HSA2.5.0 : Embrace IPv6 Hillstone’s Security Audit Platform(HSA) gives a unified overview of the network and system vulnerability to ensure risk visibility, guarantee account protection, comply with security policies and respond to any security threats in a timely manner. From network security to information security audit, HSA helps customers determine the effectiveness of their existing…