Blogs

疫情爆發時代,你不僅需要口罩的保護還需要一個資安防護專家!

本文同步發表於 iTHome 隨著網路世代的變遷,物聯網已成為未來的趨勢,資訊安全也逐漸為大眾最關切的議題之一,尤其是萬物皆相連,但萬物也皆可駭。新竹一間

Continue reading

Lionic successfully launch Pico-UTM 100 on Indiegogo

Hsinchu, Taiwan – November 19, 2020 – Lionic has developed several network security technologies based on deep packet inspection and has licensed to several major network appliances vendors like Cisco, NEC, Calix, etc. Those technologies are already mature and market proven. Now, it is time for Lionic to make its own product - Pico-UTM 100. Pico-UTM 100 is developed by Lionic’s patented Deep Packet Inspection technology, and utilizes its large virus signature database to extend 4 powerful and necessary applications nowadays.

Continue reading

2020 is a year got botted with the Covid-19 pandemic and DDoS attack!

Hsinchu, Taiwan – October 7, 2020 – According to the H1, 2020 DDOS report released by Link11, Germany, the DDoS attack average in April, May and June is 97% higher than the same period in 2019, and reach to the peak of 108% in May this year. Since the beginning of the year, there’s a new way added on the DDoS attack, the DVRs exploit vulnerability becomes the attacking route, and it has been used for hundreds of times in Q2.

Continue reading

SafetyDetectives' Interview with Eric Lu - Lionic

This article is published in [SafetyDetectives Blog] (https://www.safetydetectives.com/blog/interview-eric-lu-lionic/), [Lionic company website] (https://www.lionic.com/news/2020/07/09/safetydetectives-interview-with-eric-lu-lionic/) and [AegisLab website] (https://www.aegislab.com/news/2020/07/09/safetydetectives-interview-with-eric-lu-lionic/).   Aviva Zacks Published on: July 9, 2020       Eric Lu, Chairman and CEO of Lionic, took the time to sit for an interview with Aviva Zacks of Safety Detective. She asked him about Pico-UTM and how his company sees the future of cybersecurity.   Safety Detective: What was your journey to cybersecurity and what do you love about it?

Continue reading

New Dark_Nexus Botnet Offers DDoS Attack

The “dark_nexus” bot is named by Bitdefender researchers. It is not a Windows malware this time. The Linux ELF format executables on IoT devices are their targets. That is, the possible victims may be routers (from Dasan Zhone, Dlink, and ASUS), video recorders and so on. There are 12 kinds of CPU architectures of embedded Linux are possible to be infected. The bots inside victims form the dark_nexus botnet. A message from the researches -

Continue reading

New Variants of ZeroCleare Data Wiper Malware Attributed to Iran

In 2019 December, IBM X-Force team published a report (https://www.ibm.com/downloads/cas/OAJ4VZNJ) detailing new variants of ZeroCleare: a data-destroying malware family attributed to Iran. According to the IBM X-Force report, there are several important points - The initial access IP address of this ZeroCleare is 193.111.152.13, which was associated with ITG13 in recent Oilrig/APT34 leaks, and as also reported by Palo Alto, was used to scan target networks and access accounts as early as the fall of 2018.

Continue reading

Ryuk ransomware cyberattacked New Orleans city

Introduction Many major media have reported this security event about New Orleans city including C/NET, BleepingComputer and others. From the information provided by these media, we are almost sure that the attacker is Ryuk ransomware. Figure 1 - C/NET news about New Orleans ransomware event Figure 2 - BleepingComputer news about New Orleans ransomware event Lionic’s Inspection on Ryuk Ransomware By our survey, the Ryuk ransomware is used mainly for targeted attacks, like enterprise or governmental organizations.

Continue reading

CIRCONTROL CirCarLife 2018 Vulnerabilities are not Fixed yet

Hsinchu, Taiwan – November 18, 2019 – AegisLab reviewed several CVE (https://cve.mitre.org/) entries and found the following 2018 CVE Vulnerabilities are not fixed yet. The CIRCONTROL is notified by the email on Oct 15 but no response so far. AegisLab has done the obligation to report to CIRCONTROL one month before publishing security report. Actually CIRCONTROL should begin fixing these vulnerable devices since 2018 but they did not. The header of Lionic’s notifying email -

Continue reading

AegisLab Virus Scanner has been integrated into VirusTotal’s Malware online scanning service

Hsinchu, Taiwan – February 1, 2014 – Lionic Corporation today announced that its research laboratory, AegisLab, collaborate with VirusTotal (http://www.virustotal.com/), Google subsidiary company, a well-known website that provides checking of viruses or malicious URL online. It uses up to 52 different antivirus scan engines to check for viruses that the user’s own antivirus solution may have missed, or to verify against any false positives. This collaboration let AegisLab Antivirus engine and URL scanner integrated into VirusTotal scanning services.

Continue reading

AegisLab Web Guard has been integrated into VirusTotal’s URL online scanning service!

Hsinchu, Taiwan – November 1, 2013 – VirusTotal, a subsidiary of Google, is a free online service that analyzes files and URLs enabling the identification of viruses, worms, trojans and other kinds of malicious content detected by antivirus engines and website scanners! VirusTotal announced that AegisLab Web Guard has been integrated into the URL scanner backbone since October 31, 2013. The official announcement: VirusTotal += AegisLab WebGuard AegisLab AegisLab WebGuard is a concise malicious URL database to prevent malicious URLs, such as Drive-by-Downloads, BlackHat SEO, Fake Anti-Virus, Installer and Updates, Scarewares and etc.

Continue reading