Huolala Safety Emergency Response Center
Author

Huolala Safety Emergency Response Center

Official public account of the Huolala Safety Emergency Response Center (LLSRC)

23
Articles
0
Likes
2
Views
0
Comments
Recent Articles

Latest from Huolala Safety Emergency Response Center

23 recent articles
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Apr 15, 2026 · Information Security

How to Auto‑Label 10K APIs with 95% Confidence Using Self‑Learning Feature Engineering

This article presents a detailed case study of how a large‑scale API security team built an automated, self‑learning classification system that tags tens of thousands of APIs with business labels, improves model accuracy by five points, and maintains high precision through a confidence‑driven feedback loop.

API SecurityCatBoostSHAP
0 likes · 13 min read
How to Auto‑Label 10K APIs with 95% Confidence Using Self‑Learning Feature Engineering
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Jan 21, 2026 · Information Security

How to Build an Automated Red‑Team Framework for LLM Security Testing

This article presents a systematic approach to evaluating large language model (LLM) safety by constructing an automated red‑team testing platform that measures prompt jailbreak, privacy leakage, and tool‑execution risks, defines quantitative metrics, compares commercial and open‑source models, and outlines a continuous evolution pipeline for attack samples.

AI safetyLLM securityadversarial testing
0 likes · 20 min read
How to Build an Automated Red‑Team Framework for LLM Security Testing
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Apr 14, 2025 · Information Security

How a Key Gateway Secures Third‑Party API Calls and Prevents Key Leaks

This article analyzes the security risks of exposing third‑party service keys in modern applications, examines traditional and ideal key‑management approaches, and presents a detailed design of a Key Gateway that centralizes signing, encryption, token handling, multi‑tenant support, and robust exception management to protect sensitive credentials.

API SecurityKey ManagementMulti‑Tenant
0 likes · 17 min read
How a Key Gateway Secures Third‑Party API Calls and Prevents Key Leaks
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Mar 18, 2025 · Information Security

Uncovering MSSQL Attack Chains: Stored Procedures, COM, CLR, Triggers, and Lateral Movement

This article provides a comprehensive technical analysis of MSSQL attack vectors—including vulnerable stored procedures, COM automation, CLR exploitation, sandbox bypass, trigger abuse, proxy jobs, Kerberoasting, and linked servers—detailing prerequisites, step‑by‑step T‑SQL examples, mitigation recommendations, and overall impact on database security.

Attack ChainCLRCOM Automation
0 likes · 19 min read
Uncovering MSSQL Attack Chains: Stored Procedures, COM, CLR, Triggers, and Lateral Movement
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Jan 9, 2025 · Information Security

Detecting API Anomalous Traffic with Big Data and Machine Learning

This article outlines a comprehensive approach to API anomaly detection, covering background, objectives, a two‑layer framework with offline and real‑time feature pipelines, threshold profiling, detection methods, strategy types, and operational practices to mitigate data leakage and abuse.

Threshold Modelinganomaly detectionbig data
0 likes · 10 min read
Detecting API Anomalous Traffic with Big Data and Machine Learning
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Dec 17, 2024 · Information Security

How Secure Are AI Agents? Risks, Attacks, and Governance Strategies

This article examines the rapid growth of AI agents, outlines their core components and classifications, analyzes a wide range of privacy and security threats—including data leakage, prompt injection, jailbreak, backdoor, hallucination, and memory attacks—and proposes practical governance measures to mitigate these risks.

AI agentsGovernanceLLM
0 likes · 25 min read
How Secure Are AI Agents? Risks, Attacks, and Governance Strategies
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Jun 13, 2024 · Information Security

How HuoLala Built an Effective Human‑Centric InfoSec Training Program

This article examines the challenges of cultivating a security‑aware workforce and details HuoLala's multi‑layered "human defense" training framework, covering employee onboarding, annual all‑staff sessions, department‑specific courses, technical staff workshops, daily awareness campaigns, and engaging delivery channels to strengthen the company's overall information security culture.

culture buildingemployee traininghuman factor
0 likes · 15 min read
How HuoLala Built an Effective Human‑Centric InfoSec Training Program