Tagged articles
3 articles
Page 1 of 1
Black & White Path
Black & White Path
Feb 26, 2026 · Information Security

13 Ways Attackers Leverage Generative AI to Exploit Systems

The article outlines thirteen distinct techniques by which cybercriminals exploit generative AI—from hyper‑personalized phishing and AI‑driven malware creation to AI‑coordinated espionage, deep‑fake social engineering, and attacks on AI infrastructure—backed by expert quotes, research findings, and concrete case studies.

AI InfrastructureAI agentsattack vectors
0 likes · 14 min read
13 Ways Attackers Leverage Generative AI to Exploit Systems
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Aug 29, 2017 · Information Security

Rethinking Web Security: A Front‑End Perspective on Attack and Defense

From a front‑end engineer’s viewpoint, this article dissects web security as a holistic system, examines attack motives, targets, and vectors across browsers, transmission channels, and servers, and proposes coordinated front‑end and back‑end defenses such as encryption, signing, XSS filtering, URL whitelisting, and CSRF mitigation.

Defense StrategiesInformation Securityattack vectors
0 likes · 14 min read
Rethinking Web Security: A Front‑End Perspective on Attack and Defense
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Apr 9, 2017 · Information Security

Why Front‑End and Back‑End Security Must Work Together

The article reexamines web security as a holistic system, explaining attack goals, targets, and methods across browsers, transport channels, and servers, and shows how coordinated front‑end and back‑end defenses such as encryption, signing, and input validation are essential to protect the whole web stack.

BackendWeb Securityattack vectors
0 likes · 13 min read
Why Front‑End and Back‑End Security Must Work Together