B: Yunhai Zhang, Senior Researcher, NSFOCUS
Black Hat USA 2015 took place in Las Vegas Aug 2015. On the latest contribution list released by Microsoft Security Response Center (MSRC), Zhang Yunhai, NSFOCUS security researcher, is ranked No. 6 and NSFOCUS Security Team (NSFST) is ranked No. 28. NSFST is dedicated to discovering and resolving various security defects existing in computers and network systems. This article is what NSFST shares at the Black Hat conference.
Read More »
On 10th July 2015, Internet Systems Consortium (ISC) found that BIND 9 may contain a denial-of-service (DoS) vulnerability and started to apply for a CVE ID.
Read More »
Yunhai Zhang (@f0rgetting), NSFOCUS Senior Researcher . YunHai Zhang has been working in NSFOCUS for more than 10 years. In 2014, he won the prize from Microsoft Mitigation Bypass Bounty (MBB) for vulnerability exploitation techniques. For more details please click here.
Gartner, the world’s leading IT research and advisory company, released the 2015 Magic Quadrant for Web Application Firewalls, which recognized NSFOCUS Web Application Firewall (WAF) for a second time in a row, which we believe indicates NSFOCUS WAF’s technological strengths and protection capabilities.Read More »
To effectively protect the computer system and eliminate security risks, an in-depth understanding of the system is required. For this purpose, NSFOCUS Security Research Institute (NSRI) has set up the NSFOCUS Security Team (NSFST), which consists of senior security experts. NSFST is dedicated to discovering and resolving various security defects existing in computers and network systems. Such defects may be exploited by attackers to interrupt business operations. NSFST has been cooperating with other product vendors to address existing security issues, so as to protect users’ rightful benefits. NSFST releases their research results in the form of security bulletins or public documents, which will benefit customers, system administrators, common users, security researches, and product vendors by letting them know how these security defects arise and are resolved.