ARP: Staying Ahead of the Attack Curve

With everything digital today, various attack methods have emerged, most of which are targeted at the network layer of the TCP/IP stack. Common attack methods include but are not limited to ICMP, ACK, SYN flood and ARP spoofing and flood, among others. The ARP protocol is the fundamental protocol for the network layer. Once an…

Microsoft Recognizes Hillstone Networks Security Researchers in its 2020 World’s Most Valuable Security Researcher List

Every year, Microsoft officially releases its Microsoft Security Response Center Most Valuable Researchers, formerly MSRC TOP 100, during BlackHat in recognition of security experts around the world who have made outstanding contributions to the Microsoft software security ecosystem. Due to the pandemic, BlackHat was held as a virtual event, and Microsoft released its MSRC’s MVRs…

Apple Officially Expresses Gratitude to the Hillstone Security Research Team for Detecting a Vulnerability in Apple iOS and iPadOS

On July 24, 2020, Apple released the security content of iOS 13.6 and iPadOS 13.6. The Hillstone Security Research team made a discovery of a vulnerability that is of great significance to the optimization of Apple’s ecosystem. YongYue “BigChan” Wang, a member of the Hillstone security research team, discovered the 0-click remote arbitrary file and…

Hillstone sBDS Expands Its Product Portfolio for Broader Spectrum

Hillstone Networks is pleased to announce version 3.0 of its Server Breach Detection System (sBDS). Included in this release are two new hardware models to address the needs of customers across a broader spectrum of use cases. The I1850 model is 1RU and supports up to 1 Gbps breach detection throughput, which is ideal for…