Hsinchu, Taiwan – November 19, 2020 – Lionic has developed several network security technologies based on deep packet inspection and has licensed to several major network appliances vendors like Cisco, NEC, Calix, etc. Those technologies are already mature and market proven. Now, it is time for Lionic to make its own product - Pico-UTM 100. Pico-UTM 100 is developed by Lionic's patented Deep Packet Inspection technology, and utilizes its large virus signature database to extend 4 powerful and necessary applications nowadays.
Hsinchu, Taiwan – October 7, 2020 – According to the H1, 2020 DDOS report released by Link11, Germany, the DDoS attack average in April, May and June is 97% higher than the same period in 2019, and reach to the peak of 108% in May this year. Since the beginning of the year, there’s a new way added on the DDoS attack, the DVRs exploit vulnerability becomes the attacking route, and it has been used for hundreds of times in Q2.
This article is published in SafetyDetectives Blog, Lionic company website and AegisLab website. Aviva Zacks Published on: July 9, 2020 Eric Lu, Chairman and CEO of Lionic, took the time to sit for an interview with Aviva Zacks of Safety Detective. She asked him about Pico-UTM and how his company sees the future of cybersecurity.
The "dark_nexus" bot is named by Bitdefender researchers. It is not a Windows malware this time. The Linux ELF format executables on IoT devices are their targets. That is, the possible victims may be routers (from Dasan Zhone, Dlink, and ASUS), video recorders and so on. There are 12 kinds of CPU architectures of embedded Linux are possible to be infected. The bots inside victims form the dark_nexus botnet. A message from the researches -
In 2019 December, IBM X-Force team published a report (https://www.ibm.com/downloads/cas/OAJ4VZNJ) detailing new variants of ZeroCleare: a data-destroying malware family attributed to Iran. According to the IBM X-Force report, there are several important points - The initial access IP address of this ZeroCleare is 126.96.36.199, which was associated with ITG13 in recent Oilrig/APT34 leaks, and as also reported by Palo Alto, was used to scan target networks and access accounts as early as the fall of 2018.
Introduction Many major media have reported this security event about New Orleans city including C/NET, BleepingComputer and others. From the information provided by these media, we are almost sure that the attacker is Ryuk ransomware. Figure 1 - C/NET news about New Orleans ransomware event Figure 2 - BleepingComputer news about New Orleans ransomware event Lionic’s Inspection on Ryuk Ransomware
Hsinchu, Taiwan – November 18, 2019 – AegisLab reviewed several CVE (https://cve.mitre.org/) entries and found the following 2018 CVE Vulnerabilities are not fixed yet. The CIRCONTROL is notified by the email on Oct 15 but no response so far. AegisLab has done the obligation to report to CIRCONTROL one month before publishing security report. Actually CIRCONTROL should begin fixing these vulnerable devices since 2018 but they did not. The header of Lionic's notifying email -
Hsinchu, Taiwan – February 1, 2014 – Lionic Corporation today announced that its research laboratory, AegisLab, collaborate with VirusTotal (http://www.virustotal.com/), Google subsidiary company, a well-known website that provides checking of viruses or malicious URL online. It uses up to 52 different antivirus scan engines to check for viruses that the user’s own antivirus solution may have missed, or to verify against any false positives. This collaboration let AegisLab Antivirus engine and URL scanner integrated into VirusTotal scanning services.
Hsinchu, Taiwan – November 1, 2013 – VirusTotal, a subsidiary of Google, is a free online service that analyzes files and URLs enabling the identification of viruses, worms, trojans and other kinds of malicious content detected by antivirus engines and website scanners! VirusTotal announced that AegisLab Web Guard has been integrated into the URL scanner backbone since October 31, 2013. The official announcement: VirusTotal += AegisLab WebGuard AegisLab AegisLab WebGuard is a concise malicious URL database to prevent malicious URLs, such as Drive-by-Downloads, BlackHat SEO, Fake Anti-Virus, Installer and Updates, Scarewares and etc.