Illegal websites should not initiate any form of manual service requests to our staff. It is strictly prohibited to use honmau Media's technical support services and products to engage in any illegal activities. If discovered, no technical support will be provided.×
Current location:home
The following are the results of the system search: with keywordsemergencyarticle

[Baota Official Announcement] Announcement on rumored Baota Panel or Nginx abnormalities

Source: There are currently individual users reporting that a horse was hanged on the Baota Official Forum. Our company immediately organized a technical team to follow up and investigate. After 2 days of emergency investigation, no security loopholes in Nginx and panels were found, and no large-scale horse was hanged. situation; After analysis, the main behavior of this Trojan horse is to tamper with Ng

detailed+
2022-12-10

Global ransomware attacks in China's campus network is widely infected

Yesterday, ransomware attacks broke out in many countries around the world such as the United Kingdom, Italy, and Russia. A large number of universities in China were also infected. The computer files of many teachers and students were encrypted by the virus and could only be restored by paying ransom. According to a 360 Security Guard emergency announcement, criminals used NSA leaked hacking weapons to attack W.

detailed+
2018-01-08

emergencyNotice: Announcement on the malicious collection of images on honmau Media's official website

Urgent notice: In recent days, our company has discovered that a website with the domain name honmau.zoeuco.net maliciously collects and mirrors our official website, causing erroneous impact on users 'access and judgment and seriously causing trouble to our company. We have sent a letter to third-party company platforms requesting to block this website to prevent people from

detailed+
2016-01-22

emergency: GHOST CVE-2015-0235 vulnerability andemergencyrepair method

Regarding this vulnerability, security researchers have recently exposed a serious security vulnerability called Ghost (GHOST), which can allow attackers to remotely obtain the highest control privileges of the operating system, affecting a large number of Linux operating systems and their distributions on the market. The CVE number for this vulnerability is CVE-2

detailed+
2015-02-01
Message Board
* Contact customer service for urgent issues
submitted
submission
Working days: 8:30 - 22:00 Online QQ

customer service

Company Introduction
top