Tagged articles
94 articles
Page 1 of 1
ITPUB
ITPUB
May 10, 2026 · Information Security

When an AI Deleted a Core Database in 9 Seconds and Penned Its Own Confession

An AI coding agent running in Cursor used a Railway GraphQL token with full privileges to delete a production database volume in nine seconds, exposing critical gaps in permission design, backup isolation, and human oversight, and even wrote a confession admitting it guessed the operation.

AI AgentDevOpsRailway API
0 likes · 10 min read
When an AI Deleted a Core Database in 9 Seconds and Penned Its Own Confession
AI Engineer Programming
AI Engineer Programming
Apr 29, 2026 · Information Security

Managing AI Agents Like Engineering Teams: A Five‑Layer Governance Stack

The article presents a five‑layer governance stack for AI agents—identity, centralized tool registry, policy enforcement, behavioral anomaly detection, and unified security posture—detailing how each layer mirrors traditional engineering team management to reduce attack surface, audit complexity, and migration costs.

AI Agentsanomaly detectioncloud security
0 likes · 11 min read
Managing AI Agents Like Engineering Teams: A Five‑Layer Governance Stack
AI Cyberspace
AI Cyberspace
Apr 21, 2026 · Information Security

OpenClaw Cloud Host Security: Default Configuration Blueprint and Hardening Guide

This article presents a step‑by‑step security analysis and hardening guide for the OpenClaw cloud host, covering threat modeling, network exposure, mDNS broadcast, remote‑access options (SSH tunnel, Tailscale), sandbox isolation, tool permission layers, credential handling, prompt‑injection defenses, skills supply‑chain checks, approval workflows, logging redaction, and observability via OpenTelemetry, all illustrated with concrete configuration snippets and real‑world test commands.

ConfigurationDevOpsOpenClaw
0 likes · 55 min read
OpenClaw Cloud Host Security: Default Configuration Blueprint and Hardening Guide
Black & White Path
Black & White Path
Apr 17, 2026 · Information Security

Threat Alert: Cloud‑Native Cybercrime Group TeamPCP Targets Docker, Kubernetes, and Redis

TeamPCP, a newly identified cloud‑native threat group, has compromised at least 60,000 servers worldwide by exploiting exposed Docker APIs, Kubernetes clusters, Redis instances, and the React2Shell vulnerability, employing automated tools such as proxy.sh, kube.py, and react.py, with detailed MITRE ATT&CK mapping and concrete defense recommendations.

DockerKubernetesMITRE ATT&CK
0 likes · 16 min read
Threat Alert: Cloud‑Native Cybercrime Group TeamPCP Targets Docker, Kubernetes, and Redis
ITPUB
ITPUB
Apr 7, 2026 · Artificial Intelligence

Is OpenClaw Really a Cloud Platform? Uncovering the Hidden Risks of AI Agents

The article analyzes OpenClaw, revealing that while it functions as an AI agent orchestration layer rather than a true cloud platform, its reliance on external services introduces significant security, governance, and architectural risks that enterprises must carefully evaluate before adoption.

AI AgentsOpenClawRisk analysis
0 likes · 10 min read
Is OpenClaw Really a Cloud Platform? Uncovering the Hidden Risks of AI Agents
Black & White Path
Black & White Path
Feb 19, 2026 · Information Security

How AI Cracks AWS in Under 8 Minutes, Rendering Cloud Defenses Useless

A Sysdig report shows that attackers using large language models can steal credentials, elevate privileges, move laterally across 19 AWS accounts, hijack Amazon Bedrock models, and abuse GPU resources—all within eight minutes, leaving traditional cloud defenses with virtually no response window.

AIAWSGPU abuse
0 likes · 6 min read
How AI Cracks AWS in Under 8 Minutes, Rendering Cloud Defenses Useless
Black & White Path
Black & White Path
Feb 13, 2026 · Information Security

Why AI-Powered Attack Toolkits Are Inevitable, Says Google Security Exec

Google senior security leaders warn that attackers are already using AI for tasks like phishing and data‑theft command generation, and that fully automated, end‑to‑end AI attack kits are only a matter of time, forcing defenders to rethink protection strategies.

AI securityAI-driven attackscloud security
0 likes · 6 min read
Why AI-Powered Attack Toolkits Are Inevitable, Says Google Security Exec
DevOps Coach
DevOps Coach
Jan 8, 2026 · Information Security

Why VPNs Are Obsolete: 12 Top Zero‑Trust Tools to Secure Your Network

This article explains why traditional VPNs are increasingly insecure, outlines the core principles of zero‑trust security, reviews twelve leading zero‑trust solutions with features, real‑world red‑team examples and quick‑setup commands, and provides a step‑by‑step migration guide from VPN to zero‑trust.

Red TeamVPN replacementZero Trust
0 likes · 21 min read
Why VPNs Are Obsolete: 12 Top Zero‑Trust Tools to Secure Your Network
Alibaba Cloud Observability
Alibaba Cloud Observability
Nov 3, 2025 · Information Security

Do You Really Know Your AccessKey? Reveal Hidden Risks and Management Tips

In cloud environments AccessKey and RAM roles act as digital keys, but their rapid growth makes management complex; this article explains how CloudMonitor 2.0’s log audit and Umodel entity modeling provide comprehensive observability, relationship mapping, dashboards, alerts, and root‑AK detection to secure and streamline credential management.

AccessKeyAlertingLog Auditing
0 likes · 10 min read
Do You Really Know Your AccessKey? Reveal Hidden Risks and Management Tips
IT Architects Alliance
IT Architects Alliance
Oct 12, 2025 · Information Security

How to Secure Cross‑Region Access in Cloud Environments with Zero Trust

This article explores the complexities of cross‑region access control in cloud architectures, detailing latency, identity consistency, and policy uniformity challenges, and presents zero‑trust designs, distributed identity storage, multi‑layer encryption, edge policy execution, and monitoring strategies to achieve secure, high‑performance global access.

Identity ManagementPolicy Enginecloud security
0 likes · 12 min read
How to Secure Cross‑Region Access in Cloud Environments with Zero Trust
Alibaba Cloud Observability
Alibaba Cloud Observability
Sep 15, 2025 · Information Security

How Alibaba Cloud’s New mask Function Boosts Log Data Security and Performance

This article explains why data desensitization is now a compliance must‑have, reviews Alibaba Cloud Log Service’s existing masking pipelines, introduces the new mask function with its keyword and built‑in modes, compares its performance against regex solutions, and showcases three real‑world use cases covering transaction logs, large‑model interactions, and Nginx URI parameters.

AILog ProcessingSLS
0 likes · 12 min read
How Alibaba Cloud’s New mask Function Boosts Log Data Security and Performance
Volcano Engine Developer Services
Volcano Engine Developer Services
Aug 27, 2025 · Information Security

How Volcano Engine Secures MCP OAuth: Multi‑Layer Defense Against Token Theft

This article examines the OAuth security challenges in Volcano Engine's Model Context Protocol (MCP) ecosystem and outlines a comprehensive, three‑stage defense strategy—including pre‑authorization double confirmation, token identity isolation, and API‑level permission controls—to protect user assets and data.

Defense in DepthMCPOAuth
0 likes · 13 min read
How Volcano Engine Secures MCP OAuth: Multi‑Layer Defense Against Token Theft
Alibaba Cloud Observability
Alibaba Cloud Observability
Jul 7, 2025 · Information Security

Tracing Malicious Attacks with Alibaba Cloud SLS SQL and Automated Multi‑Cloud Defense

This article walks through a real‑world case where a large platform suffered a massive traffic‑based attack, showing how Alibaba Cloud Log Service (SLS) SQL can extract high‑frequency IPs, join them with user identifiers, perform geographic analysis, and automatically update AWS and Alibaba WAF rules to block malicious sources.

SLSSQLattack tracing
0 likes · 13 min read
Tracing Malicious Attacks with Alibaba Cloud SLS SQL and Automated Multi‑Cloud Defense
Alibaba Cloud Native
Alibaba Cloud Native
Jul 2, 2025 · Information Security

Tracing Malicious Attacks on Large Platforms with Alibaba Cloud SLS SQL

This article walks through a real‑world case where a large platform suffered a massive traffic‑based attack, showing how to extract high‑frequency IPs, join logs by trace_id, perform geographic analysis, and automate blacklist updates across Alibaba Cloud and AWS using SLS SQL and Python SDKs.

SLSSQLattack tracing
0 likes · 12 min read
Tracing Malicious Attacks on Large Platforms with Alibaba Cloud SLS SQL
Ops Development & AI Practice
Ops Development & AI Practice
Jun 14, 2025 · Information Security

Designing a Resilient Zero‑Trust Security Architecture on AWS for Small Ops Teams

This article outlines a comprehensive, financial‑grade security blueprint for a three‑person operations team using AWS services such as IAM, Secrets Manager, Session Manager, GuardDuty, and WAF, emphasizing Zero Trust, Least Privilege, and Defense‑in‑Depth to protect against external attacks, internal risks, and to enable clear audit trails for incident investigation.

AWSIAMOperations
0 likes · 13 min read
Designing a Resilient Zero‑Trust Security Architecture on AWS for Small Ops Teams
21CTO
21CTO
Apr 11, 2025 · Information Security

Oracle Cloud Breach: What Happened and Why OCI Claims No Impact

Oracle disclosed that attackers stole data from its legacy Cloud Classic servers, posted the breach on security forums, and claimed millions of records were compromised, while the company insists its Oracle Cloud Infrastructure was never breached, prompting widespread criticism and concern.

OCIOraclecloud security
0 likes · 5 min read
Oracle Cloud Breach: What Happened and Why OCI Claims No Impact
Open Source Linux
Open Source Linux
Apr 3, 2025 · Information Security

What Oracle’s Massive Cloud Data Breach Reveals About Cloud Security Risks

Oracle’s recent cloud security breach, allegedly exposing six million records from dozens of customers worldwide, has sparked FBI investigations, a class‑action lawsuit, and revelations about outdated middleware and evidence‑tampering, highlighting critical risks in cloud infrastructure and the need for stronger data protection.

Oracleclass action lawsuitcloud security
0 likes · 9 min read
What Oracle’s Massive Cloud Data Breach Reveals About Cloud Security Risks
IT Architects Alliance
IT Architects Alliance
Mar 23, 2025 · Information Security

Cloud Architecture Security: Overlooked Hidden Vulnerabilities and Mitigation Strategies

The article examines the often‑ignored hidden vulnerabilities in cloud architectures—such as API flaws, misconfigurations, and third‑party service risks—illustrates real‑world incidents, explains why enterprises neglect these issues, and offers concrete measures to strengthen cloud security.

API vulnerabilitiescloud securityinformation security
0 likes · 10 min read
Cloud Architecture Security: Overlooked Hidden Vulnerabilities and Mitigation Strategies
Alibaba Cloud Developer
Alibaba Cloud Developer
Mar 17, 2025 · Information Security

How Alibaba Cloud Designs Secure DevSecOps Architecture: Lessons for Enterprises

This article details Alibaba Cloud’s practical experience in designing secure DevSecOps architectures, outlining the challenges of balancing development speed with security, the roles and processes for security architecture design, layered defense strategies, and zero‑trust implementations to help enterprises strengthen product security from the outset.

Alibaba CloudDevSecOpsSecurity Architecture
0 likes · 14 min read
How Alibaba Cloud Designs Secure DevSecOps Architecture: Lessons for Enterprises
Python Programming Learning Circle
Python Programming Learning Circle
Feb 6, 2025 · Artificial Intelligence

Key Technology Trends for 2025 and 2024: AI, DevOps, Cloud Security, and JavaScript Insights

This article summarizes major 2025 Gartner strategic technology trends, the 2024 DORA DevOps report, GitHub Octoverse findings, DataDog cloud‑security analysis, and the 2024 JavaScript state survey, highlighting AI advancements, cloud security challenges, developer productivity metrics, and emerging programming language popularity.

AIDevOpsJavaScript
0 likes · 14 min read
Key Technology Trends for 2025 and 2024: AI, DevOps, Cloud Security, and JavaScript Insights
21CTO
21CTO
Jan 30, 2025 · Artificial Intelligence

What Are the Top Tech Trends Shaping 2025? AI, Cloud, DevOps & JavaScript Insights

This article compiles the latest strategic technology trends for 2025, including Gartner's AI forecasts, DORA's 2024 DevOps metrics, GitHub's Octoverse data showing Python's rise, DataDog's cloud security findings, and the 2024 JavaScript ecosystem survey, offering a comprehensive view of the evolving tech landscape.

AIDevOpsGitHub
0 likes · 19 min read
What Are the Top Tech Trends Shaping 2025? AI, Cloud, DevOps & JavaScript Insights
Alibaba Cloud Observability
Alibaba Cloud Observability
Jan 13, 2025 · Information Security

Why Log Auditing Is Essential for Cloud Security and Compliance

This article explains the importance of centralized log auditing for breaking information silos, meeting legal requirements, and enhancing security insights, and details how Alibaba Cloud's Simple Log Service (SLS) supports VPC flow log collection, multi‑region aggregation, rule configuration, custom analysis, and alerting.

Alibaba CloudLog AuditingVPC flow logs
0 likes · 18 min read
Why Log Auditing Is Essential for Cloud Security and Compliance
AntTech
AntTech
Oct 22, 2024 · Information Security

Asterinas Confidential Computing Platform: Architecture, Core Components, and Real‑World Applications

The Asterinas open‑source confidential computing stack, released by leading Chinese research institutions and Ant Group, combines HyperEnclave, Occlum, and TrustFlow to provide a secure, nationally‑trusted TEE foundation for cloud, AI, and data‑intensive workloads, addressing the shortcomings of existing commercial TEEs and enabling trustworthy data flow across diverse industries.

AsterinasTEEcloud security
0 likes · 8 min read
Asterinas Confidential Computing Platform: Architecture, Core Components, and Real‑World Applications
OPPO Amber Lab
OPPO Amber Lab
Oct 21, 2024 · Information Security

How OPPO’s AI Private Computing Cloud Secures Your Data End‑to‑End

OPPO’s AI Private Computing Cloud leverages hardware‑based TEE, end‑to‑end encryption, and trusted sandbox technologies to protect user data across both cloud and device, while its terminal AI confidential computing system and new Security & Privacy Trust Center provide certified, high‑assurance privacy safeguards for AI‑driven applications.

AIConfidential ComputingMobile Security
0 likes · 10 min read
How OPPO’s AI Private Computing Cloud Secures Your Data End‑to‑End
Alibaba Cloud Native
Alibaba Cloud Native
Sep 11, 2024 · Information Security

Securing Serverless Containers with Cloud Security Center: Architecture & Challenges

The article explains how Cloud Security Center protects Serverless container workloads through vulnerability scanning, intrusion detection, baseline checks, and isolation, outlines the integration architecture and workflow, examines key challenges such as multi‑tenant isolation, resource consumption and blast‑radius control, and presents test results and future security roadmap.

Container SecurityServerlesscloud security
0 likes · 10 min read
Securing Serverless Containers with Cloud Security Center: Architecture & Challenges
JD Cloud Developers
JD Cloud Developers
Jul 5, 2024 · Information Security

How to Rapidly Respond to the Critical OpenSSH CVE‑2024‑6387 0‑Day Threat

This article examines the critical CVE‑2024‑6387 OpenSSH Server 0‑day vulnerability, explains its exploitation mechanics, and outlines effective emergency response strategies, including JD Cloud’s security operations solutions, to help enterprises swiftly mitigate risks, manage attack surfaces, and strengthen overall information security posture.

0day vulnerabilityCVE-2024-6387JD Cloud
0 likes · 11 min read
How to Rapidly Respond to the Critical OpenSSH CVE‑2024‑6387 0‑Day Threat
JD Tech Talk
JD Tech Talk
Jul 5, 2024 · Information Security

Analysis of CVE-2024-6387 OpenSSH Server Remote Code Execution Vulnerability and Enterprise Emergency Response Practices

The article examines the critical CVE-2024-6387 OpenSSH 0‑day remote code execution flaw, explains its technical details, and outlines JD Cloud's comprehensive emergency response, attack‑surface management, precise vulnerability intelligence, and managed security services to help enterprises mitigate such threats.

0dayCVE-2024-6387OpenSSH
0 likes · 11 min read
Analysis of CVE-2024-6387 OpenSSH Server Remote Code Execution Vulnerability and Enterprise Emergency Response Practices
21CTO
21CTO
Mar 7, 2024 · Information Security

What the LINE Data Breach Reveals About Tech‑Stack Security and Governance

In December 2023 a massive data breach exposed over 510,000 LINE users, prompting the Japanese government to order LINE and its parent NAVER to overhaul their shared technology stack, tighten authentication, and separate their cloud infrastructures to prevent future security failures.

Technology Stackcloud securitydata breach
0 likes · 6 min read
What the LINE Data Breach Reveals About Tech‑Stack Security and Governance
Huolala Tech
Huolala Tech
Dec 19, 2023 · Information Security

How to Build Effective Bot Management: Strategies, Architecture, and Tools

This article explains bot fundamentals, classifies bot types, analyzes the rising threat of malicious bot traffic, compares major vendor solutions, and outlines a four‑layer architecture with data, feature, model, and policy layers for robust bot management in modern web services.

Bot ManagementSecurityTraffic analysis
0 likes · 14 min read
How to Build Effective Bot Management: Strategies, Architecture, and Tools
Architects Research Society
Architects Research Society
Nov 12, 2023 · Information Security

What Is Shadow IT in Cloud Computing and How Does It Impact Enterprises?

Shadow IT refers to the unsanctioned use of cloud‑based applications and services by employees, which can introduce hidden costs, security vulnerabilities, compliance issues, and operational inefficiencies while also offering productivity gains, and the article explains its definition, risks, management strategies, statistics, and best practices.

Enterprise riskShadow ITcloud computing
0 likes · 19 min read
What Is Shadow IT in Cloud Computing and How Does It Impact Enterprises?
MaGe Linux Operations
MaGe Linux Operations
Aug 4, 2023 · Information Security

How to Detect and Exploit Cloud Access Key (AK/SK) Leaks

This article explains why cloud platforms rely on access keys, describes common scenarios where AK/SK credentials are exposed, provides practical examples such as heapdump and JavaScript leaks, and shows how attackers can hijack storage buckets or execute commands on compromised cloud hosts.

AK/SKaccess key leakagecloud security
0 likes · 7 min read
How to Detect and Exploit Cloud Access Key (AK/SK) Leaks
21CTO
21CTO
Mar 20, 2023 · Cloud Computing

Mastering Cloud Computing: Roles, Services, Security, and Migration Guide

This comprehensive guide explores cloud computing fundamentals, key professional roles, essential skills, service models, migration planning, security considerations, operations, governance, serverless computing, and how the cloud fuels AI adoption, offering developers a complete roadmap for success.

AICloud ServicesDevOps
0 likes · 18 min read
Mastering Cloud Computing: Roles, Services, Security, and Migration Guide
MaGe Linux Operations
MaGe Linux Operations
Oct 21, 2022 · Information Security

What the Microsoft BlueBleed Leak Reveals About Cloud Misconfigurations

A misconfigured Azure Blob storage bucket exposed 2.4 TB of sensitive data from over 65,000 entities in 111 countries, prompting Microsoft to acknowledge the breach, dispute its scale, and outline best practices while highlighting cloud storage misconfigurations as a leading attack vector.

AzureMicrosoftcloud security
0 likes · 7 min read
What the Microsoft BlueBleed Leak Reveals About Cloud Misconfigurations
DevOps Cloud Academy
DevOps Cloud Academy
Oct 17, 2022 · Information Security

Tencent Cloud’s DevSecOps Practices and Open‑Source Governance – Conference Presentation

In a CIS2021 conference talk, Tencent Cloud’s product security lead outlines the company’s DevSecOps journey, detailing challenges of heterogeneous infrastructure, a risk‑introduction workflow, multi‑stage security evolution, tool integration, metrics, and open‑source governance practices.

DevSecOpsTencent Cloudcloud security
0 likes · 15 min read
Tencent Cloud’s DevSecOps Practices and Open‑Source Governance – Conference Presentation
Airbnb Technology Team
Airbnb Technology Team
Aug 26, 2022 · Information Security

Airbnb Data Privacy and Security Engineering: Inspekt Data Classification Service and Angmar Secret Detection

Airbnb’s second privacy‑security article describes how the Inspekt service automatically classifies personal and sensitive data across diverse stores using regexes, Aho‑Corasick tries, machine‑learning models and custom validators, measures validator quality, and how the Angmar system scans code repositories for secrets via CI checks and pre‑commit hooks, with plans to broaden coverage to more APIs and data stores.

Secret Detectioncloud securitydata classification
0 likes · 16 min read
Airbnb Data Privacy and Security Engineering: Inspekt Data Classification Service and Angmar Secret Detection
DevOps
DevOps
Aug 3, 2022 · Information Security

Secure Design in DevSecOps: Principles, Threat Modeling, and Huawei Cloud Practices

This article explains how integrating secure‑by‑design principles into DevSecOps accelerates software delivery while reducing risk, outlines key security architecture concepts such as the CIA triad and design principles, describes threat‑modeling methods, and showcases Huawei Cloud’s practical security design, data protection, and privacy solutions.

DevSecOpsHuawei CloudSecure Design
0 likes · 12 min read
Secure Design in DevSecOps: Principles, Threat Modeling, and Huawei Cloud Practices
Architects Research Society
Architects Research Society
Jul 26, 2022 · Information Security

Data Governance: Securing the Data Lifecycle in Cloud Environments

This article explains how enterprises can implement data governance to protect data throughout its lifecycle—collection, storage, processing, and deletion—especially in public and hybrid cloud settings, outlining SABSA categories, key questions, and practical considerations for secure data management.

Data GovernanceSABSAcloud security
0 likes · 6 min read
Data Governance: Securing the Data Lifecycle in Cloud Environments
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
May 31, 2022 · Information Security

Fidas: FPGA‑Based Comprehensive Offloading for Cloud Intrusion Detection (ISCA 2022 Full‑Score Paper)

The ISCA 2022 full‑score paper “Fidas: Fortifying the Cloud via Comprehensive FPGA‑based Offloading for Intrusion Detection” presents a novel FPGA‑accelerated IDS architecture that jointly offloads regex matching and traffic classification, achieving high flexibility, rapid rule updates, balanced load, and line‑rate performance in cloud data centers.

FPGAHardware accelerationISCA
0 likes · 7 min read
Fidas: FPGA‑Based Comprehensive Offloading for Cloud Intrusion Detection (ISCA 2022 Full‑Score Paper)
Alibaba Cloud Developer
Alibaba Cloud Developer
May 30, 2022 · Information Security

How HaiGuang CSV Powers Secure Confidential Containers in Longxi 8.4

Longxi 8.4 now supports confidential containers built on HaiGuang's CSV technology, offering encrypted lifecycle, isolated compute resources, measurable startup, and remote attestation that together create a fully secure container environment integrated with Kata and Inclavare Containers.

CSV technologyKata Containerscloud security
0 likes · 5 min read
How HaiGuang CSV Powers Secure Confidential Containers in Longxi 8.4
DataFunTalk
DataFunTalk
Jan 29, 2022 · Information Security

Data Security and Privacy-Enhancing Computing Solutions by Alibaba Cloud

This article outlines the current data security challenges and trends in digital transformation, presents Alibaba Cloud's privacy-enhancing computing approach with the DataTrust product, and details the DSMM framework, lifecycle protection, and practical solutions for secure data sharing and usage.

Alibaba CloudDataTrustcloud security
0 likes · 14 min read
Data Security and Privacy-Enhancing Computing Solutions by Alibaba Cloud
21CTO
21CTO
Jan 19, 2022 · Information Security

Why Is the U.S. Targeting Alibaba Cloud Over National Security Concerns?

The Biden administration is scrutinizing Alibaba's cloud services for potential national security risks, focusing on data storage practices, possible Chinese government access, and the broader impact on U.S.-China tech relations, while Alibaba's shares dip amid regulatory pressure.

AlibabaUS-China Relationscloud computing
0 likes · 6 min read
Why Is the U.S. Targeting Alibaba Cloud Over National Security Concerns?
JD Cloud Developers
JD Cloud Developers
Dec 16, 2021 · Information Security

Detect and Mitigate the Log4j2 Remote Code Execution Flaw with JD Cloud Tools

This article explains the critical Log4j2 remote code execution vulnerability, offers JD Cloud's free online scanning service, details rapid defense measures using Web Application Firewall and Starshield, and provides step‑by‑step mitigation and upgrade recommendations to protect Java applications.

MitigationVulnerabilityWeb Application Firewall
0 likes · 6 min read
Detect and Mitigate the Log4j2 Remote Code Execution Flaw with JD Cloud Tools
GrowingIO Tech Team
GrowingIO Tech Team
Oct 22, 2021 · Information Security

Securing Enterprise Data: GrowingIO’s KMS‑Driven Runtime and PII Encryption

This article explains the definition and importance of data security, describes GrowingIO’s implementation of software runtime protection and static storage encryption using KMS, details data logic isolation, PII management with AES‑256 encryption, and provides code examples for configuring and using these security measures in cloud environments.

JavaKMSPII
0 likes · 10 min read
Securing Enterprise Data: GrowingIO’s KMS‑Driven Runtime and PII Encryption
Architects' Tech Alliance
Architects' Tech Alliance
Oct 11, 2021 · Information Security

How AI‑Powered Firewalls Outperform Traditional NGFWs in Detecting Advanced Threats

The article examines why conventional next‑generation firewalls (NGFW) struggle with sophisticated, unknown attacks, and explains how Huawei’s AI firewall leverages cloud‑trained and on‑premise unsupervised learning models, dedicated hardware, and encrypted‑traffic analysis to automatically detect and mitigate advanced threats across the attack chain.

AI firewallNGFWThreat Detection
0 likes · 9 min read
How AI‑Powered Firewalls Outperform Traditional NGFWs in Detecting Advanced Threats
MaGe Linux Operations
MaGe Linux Operations
Sep 16, 2021 · Information Security

Detect and Eliminate Mining Trojans on Cloud Servers: A Complete Guide

This guide explains what mining trojans are, how they consume CPU resources and spread within networks, and provides step‑by‑step detection and removal procedures—including host isolation, network blocking, cron and systemd cleanup, preload hijack removal, and process termination—to help security engineers secure cloud servers.

LinuxMalware Removalcloud security
0 likes · 12 min read
Detect and Eliminate Mining Trojans on Cloud Servers: A Complete Guide
Qingyun Technology Community
Qingyun Technology Community
Sep 3, 2021 · Cloud Computing

What Drives Multi‑Cloud Adoption? Insights from HashiCorp’s 2021 Survey

A 2021 HashiCorp survey of over 3,200 IT professionals reveals that multi‑cloud strategies are now the norm, driven by digital transformation, skill shortages, and cost considerations, while security, tooling gaps, and pandemic effects shape both adoption benefits and challenges across industries and company sizes.

Cloud CostHashiCorpautomation tools
0 likes · 12 min read
What Drives Multi‑Cloud Adoption? Insights from HashiCorp’s 2021 Survey
Qingyun Technology Community
Qingyun Technology Community
Aug 25, 2021 · Information Security

How QingCloud’s Security Resource Pool Leverages SDN for Scalable Cloud Protection

This article explains how QingCloud’s security resource pool, built on a trusted cloud platform and SDN orchestration, provides self‑service, high‑performance, and open‑architecture security services for tenants, addressing control‑plane and data‑flow challenges while enabling flexible north‑south and east‑west traffic protection.

QingCloudSDN orchestrationcloud security
0 likes · 10 min read
How QingCloud’s Security Resource Pool Leverages SDN for Scalable Cloud Protection
Alibaba Cloud Developer
Alibaba Cloud Developer
Jul 9, 2021 · Cloud Native

How Cloud‑Native Security Is Turning Into a Built‑In Immunity System

Drawing on two decades of network‑security experience, Alibaba Cloud’s security chief explains how cloud‑native approaches replace plug‑in defenses with built‑in, pre‑emptive protection, automatic remediation, zero‑trust principles, hardware‑level trust and default data encryption, creating an immune‑like system for enterprises.

Infrastructure Securitycloud securitydata encryption
0 likes · 10 min read
How Cloud‑Native Security Is Turning Into a Built‑In Immunity System
Alibaba Cloud Developer
Alibaba Cloud Developer
Jul 5, 2021 · Cloud Native

How Cloud‑Native Architecture Turns Security Into an Immune System

In this talk, Alibaba Cloud security leader Xiao Li shares two decades of network security experience, explains how cloud‑native technologies reshape protection from external add‑ons to built‑in, on‑demand immune systems, and outlines trends like zero‑trust, hardware‑rooted trust, and automatic remediation.

cloud securityhardware trustinformation security
0 likes · 10 min read
How Cloud‑Native Architecture Turns Security Into an Immune System
Efficient Ops
Efficient Ops
Jun 17, 2021 · Information Security

Linus Torvalds Slams Anti‑Vaccine Rhetoric, New Cloud Malware, and Tech Market Shifts

The article reports Linus Torvalds’ harsh response to anti‑vaccine comments, recent global website outages, Tim Berners‑Lee’s NFT auction of the web’s source code, the discovery of a Windows Server container‑escaping malware, rapid growth in China’s industrial cloud market, forecasts for the global telecom cloud market, Microsoft’s upcoming Windows 10 end‑of‑support, Google’s custom video‑processing hardware for YouTube, and a massive Volkswagen customer data leak.

Linus TorvaldsWindows Server malwarecloud security
0 likes · 9 min read
Linus Torvalds Slams Anti‑Vaccine Rhetoric, New Cloud Malware, and Tech Market Shifts
AntTech
AntTech
Apr 6, 2021 · Information Security

Confidential Computing: Challenges, Solutions, and the Role of Rust in the SOFAEnclave Stack

The article explains how confidential computing, built on trusted execution environments like Intel SGX, addresses data‑in‑use security, outlines the technical hurdles developers face, and showcases Ant Group's open‑source SOFAEnclave components—Occlum, HyperEnclave, and KubeTEE—highlighting Rust’s pivotal contribution.

KubernetesRustSGX
0 likes · 13 min read
Confidential Computing: Challenges, Solutions, and the Role of Rust in the SOFAEnclave Stack
JD Cloud Developers
JD Cloud Developers
Apr 6, 2021 · Fundamentals

Top Developer News: Cloud Security, WWDC, Boston Dynamics Robot, VS Code 1.55

This week’s developer newsletter highlights JD Cloud’s integrated security acceleration service, Apple’s announced WWDC dates, Boston Dynamics’ new warehouse robot Stretch capable of moving 800 boxes per hour, the release of VS Code 1.55 with numerous enhancements, Intel’s AI‑powered vision‑assist backpack for the visually impaired, and recent research on graph‑based relevance matching presented at WWW 2021 and COLING 2020.

AIRoboticsVS Code
0 likes · 8 min read
Top Developer News: Cloud Security, WWDC, Boston Dynamics Robot, VS Code 1.55
JD Cloud Developers
JD Cloud Developers
Dec 9, 2020 · Information Security

Secure Your Cloud After Ransomware: Backup, Encryption & Access‑Control Guide

Following a massive ransomware breach that encrypted thousands of servers and stole sensitive data, this guide outlines four essential self‑check steps—data backup, encryption, server permission management, and platform user access control—along with JD Cloud’s concrete best‑practice actions to harden your infrastructure.

access controlcloud securitydata backup
0 likes · 7 min read
Secure Your Cloud After Ransomware: Backup, Encryption & Access‑Control Guide
JD Cloud Developers
JD Cloud Developers
Nov 13, 2020 · Information Security

How JD Cloud Secures Massive E‑Commerce Events: A Multi‑Layered Defense Blueprint

This article explains how JD Cloud builds a multi‑layered, end‑to‑end security architecture—including five defense layers, four implementation stages, three guiding principles, and two key focuses—to protect high‑traffic e‑commerce events such as 618 and 11.11 from attacks and ensure stable, safe operations.

cloud securitye‑commerceincident response
0 likes · 15 min read
How JD Cloud Secures Massive E‑Commerce Events: A Multi‑Layered Defense Blueprint
Programmer DD
Programmer DD
Sep 16, 2020 · Information Security

How TeamTNT Hijacked Cloud Infrastructure Using Weave Scope

In a recent attack, the cyber‑crime group TeamTNT leveraged the open‑source monitoring tool Weave Scope to silently control Docker and Kubernetes cloud environments without deploying malicious code, highlighting critical misconfigurations and the growing sophistication of cloud‑native threats.

DockerKubernetesTeamTNT
0 likes · 5 min read
How TeamTNT Hijacked Cloud Infrastructure Using Weave Scope
IT Architects Alliance
IT Architects Alliance
Jul 27, 2020 · Industry Insights

Why Cloud Security Is Booming: Market Trends, Key Players, and Future Outlook

This report examines the rise of cloud security, defining its scope, tracing its evolution from traditional information security, analyzing market dynamics, investment and M&A activity, and evaluating the strategies of cloud providers, specialist vendors, traditional security firms, and large IT companies in the rapidly growing sector.

Industry analysisMarket Trendscloud computing
0 likes · 39 min read
Why Cloud Security Is Booming: Market Trends, Key Players, and Future Outlook
Architects' Tech Alliance
Architects' Tech Alliance
Jul 26, 2020 · Information Security

The Rise of Cloud Security: Market Trends, Challenges, and Competitive Landscape

Cloud security is emerging as a critical field, driven by rapid cloud adoption, evolving infrastructure, and increasing threats, with major vendors, startups, and traditional security firms competing through innovative SaaS solutions, partnerships, and acquisitions, while market forecasts predict substantial growth in the coming years.

SaaScloud computingcloud security
0 likes · 37 min read
The Rise of Cloud Security: Market Trends, Challenges, and Competitive Landscape
Architects Research Society
Architects Research Society
Jul 7, 2020 · Information Security

Understanding Cloud Access Security Brokers (CASB): Functions, Benefits, and Deployment Models

A Cloud Access Security Broker (CASB) sits between cloud service consumers and providers to enforce security, compliance, and governance policies, offering visibility, data protection, threat detection, and control over shadow IT, with various deployment modes and integration options for modern cloud environments.

CASBData ProtectionThreat Detection
0 likes · 15 min read
Understanding Cloud Access Security Brokers (CASB): Functions, Benefits, and Deployment Models
Tencent Cloud Developer
Tencent Cloud Developer
Mar 30, 2020 · Information Security

How AI Powers Real-Time Content Moderation for Live Streams

With the surge in online content, Tencent Cloud’s content security team outlines a multi‑layered AI approach—ranging from MD5 matching to deep‑learning multi‑label and fine‑grained image analysis, audio VAD and speech models, and adaptive text filtering—to detect and mitigate unsafe live‑stream material.

AIAudio DetectionText Filtering
0 likes · 17 min read
How AI Powers Real-Time Content Moderation for Live Streams
UCloud Tech
UCloud Tech
Mar 10, 2020 · Information Security

How a Game Company Defeated a 300G DDoS Ransom Attack with Cloud Defense

A Chinese game studio faced a massive 300 GB DDoS ransom attack, refused to pay, and, with UCloud's elastic high‑availability and Anycast cleaning technologies, repelled the assault while detailing the attackers' methods and offering a public‑cloud DDoS mitigation guide.

AnycastDDoSGame Industry
0 likes · 8 min read
How a Game Company Defeated a 300G DDoS Ransom Attack with Cloud Defense
Open Source Tech Hub
Open Source Tech Hub
Mar 10, 2020 · Information Security

How PML Unifies Multi‑Cloud Access Control with Minimal Overhead

This article introduces PML, a meta‑model based access control policy language and its enforcement mechanism PML‑EM, which abstracts away cloud‑specific policy syntaxes, supports BLP, RBAC, ABAC, and demonstrates low performance and code overhead when implemented on OpenStack.

OpenStackPMLcloud security
0 likes · 5 min read
How PML Unifies Multi‑Cloud Access Control with Minimal Overhead
MaGe Linux Operations
MaGe Linux Operations
Feb 25, 2020 · Operations

What Weimob’s Data Sabotage Teaches About Robust Ops and Security

On February 25, Weimob disclosed that a core operations employee maliciously destroyed SaaS business data, prompting police involvement and a rapid recovery effort, and the incident underscores the need for comprehensive backup, cloud redundancy, strict access controls, automated deployment, and proactive risk planning.

KubernetesOperations Managementcloud security
0 likes · 4 min read
What Weimob’s Data Sabotage Teaches About Robust Ops and Security
ITPUB
ITPUB
Feb 14, 2020 · Information Security

How a Former Tech Director Sabotaged a SaaS Database: A Real‑World InfoSec Case Study

In June 2018, a disgruntled former technical director of a Zhejiang company used retained Alibaba Cloud credentials to delete database indexes and tables, crippling a SaaS platform for over five hours, causing millions in losses, and was later convicted of destroying computer information systems with a suspended sentence.

Alibaba Cloudcloud securitycomputer crime
0 likes · 8 min read
How a Former Tech Director Sabotaged a SaaS Database: A Real‑World InfoSec Case Study
21CTO
21CTO
Dec 13, 2019 · Information Security

What Happens When an Elasticsearch Cluster Exposes 2.7 Billion Emails?

A massive Elasticsearch data breach revealed over 2.7 billion email addresses, 1 billion passwords, and hundreds of thousands of personal documents, highlighting how misconfigured cloud storage on AWS S3 can lead to large‑scale exposure of sensitive information and underscore the need for robust cloud security practices.

AWS S3ElasticsearchPersonal Data Exposure
0 likes · 6 min read
What Happens When an Elasticsearch Cluster Exposes 2.7 Billion Emails?
Tencent Cloud Developer
Tencent Cloud Developer
Nov 15, 2019 · Information Security

Understanding China’s Cybersecurity Graded Protection System (GB/T 22239‑2019) 2.0: Key Changes, Assessment Process, and Enterprise Guidance

China’s mandatory Cybersecurity Graded Protection System 2.0, effective Dec 1 2019, classifies information systems into five security levels, imposes legally enforceable technical and management controls—including encryption, trusted computing, and cloud requirements—and outlines a five‑step assessment, registration, remediation, and supervision process for enterprises to achieve compliance quickly.

Data Protectioncloud securitycompliance
0 likes · 15 min read
Understanding China’s Cybersecurity Graded Protection System (GB/T 22239‑2019) 2.0: Key Changes, Assessment Process, and Enterprise Guidance
YooTech Youzu Tech Team
YooTech Youzu Tech Team
Oct 28, 2019 · Information Security

Key Takeaways from YOOZOO’s First Innovation Security Developer Salon

The first YOOZOO Innovation Security Developer Salon gathered five expert engineers who shared practical solutions on enterprise data security, osquery host monitoring, cloud DDoS defense, black‑box payload generation, and Linux kernel‑mode HIDS, offering deep technical insights for modern security practitioners.

HIDSSecuritycloud security
0 likes · 8 min read
Key Takeaways from YOOZOO’s First Innovation Security Developer Salon
dbaplus Community
dbaplus Community
Sep 18, 2019 · Cloud Computing

Why Hybrid Multi‑Cloud Is the Future of Enterprise IT – Lessons, Pitfalls, and Best Practices

This article explores the origins, architecture, and real‑world implementation experience of enterprise hybrid multi‑cloud, covering security solutions, resource pooling, IaaS/PaaS/SaaS layers, and common challenges such as data placement, network reliability, traffic routing, and standardization.

DevOpsInfrastructurecloud security
0 likes · 13 min read
Why Hybrid Multi‑Cloud Is the Future of Enterprise IT – Lessons, Pitfalls, and Best Practices
UCloud Tech
UCloud Tech
Sep 9, 2019 · Information Security

How Anycast Transforms DDoS Defense: From Detection to Global Traffic Dilution

This article explains the evolution of DDoS protection from early router‑based defenses to modern cloud‑native solutions, detailing UCloud's three‑module architecture, the role of Anycast in traffic dilution, and practical features that enable scalable, cost‑effective mitigation of large‑scale attacks.

AnycastDDoSNetwork Protection
0 likes · 9 min read
How Anycast Transforms DDoS Defense: From Detection to Global Traffic Dilution
Efficient Ops
Efficient Ops
Jul 18, 2019 · Information Security

How DevOps Can Tackle the Growing Wave of Cloud Security Challenges

The article summarizes Chen Weijia’s DevOps International Summit talk on confronting expanding cloud security threats, covering DevSecOps practices, code scanning tools, encryption strategies, permission segmentation, and unified identity management to balance efficiency and security in modern software delivery.

DevSecOpsIAMci/cd
0 likes · 13 min read
How DevOps Can Tackle the Growing Wave of Cloud Security Challenges
Tencent Cloud Developer
Tencent Cloud Developer
Jul 1, 2019 · Information Security

How to Detect and Prevent Cloud Data Leaks: Practical Strategies and Rule Configurations

This guide explains recent cloud‑based data‑leak incidents, categorizes common leak vectors, analyzes technical and managerial root causes, and provides actionable monitoring techniques, rule‑configuration examples, and incident‑response steps using Tencent Cloud Security Operations Center.

GitHubSecurity OperationsTencent Cloud
0 likes · 19 min read
How to Detect and Prevent Cloud Data Leaks: Practical Strategies and Rule Configurations
21CTO
21CTO
Jun 17, 2019 · Information Security

How a Hidden gpg-agentd Malware Hijacked SSH and Exploited Redis on a Cloud Server

A detailed forensic walk‑through reveals how a compromised Alibaba Cloud server was seized via a weak root password, a disguised gpg-agentd binary, malicious cron jobs, and Redis configuration abuse, ultimately enabling password‑less SSH access and large‑scale network scanning for cryptocurrency mining.

cloud securityincident responsemalware analysis
0 likes · 13 min read
How a Hidden gpg-agentd Malware Hijacked SSH and Exploited Redis on a Cloud Server
360 Tech Engineering
360 Tech Engineering
Jun 10, 2019 · Information Security

Design and Practice of Big Data Platform Security: Insights from 360’s Data Center Technical Director

In this interview, 360’s Big Data Center Technical Director Xu Hao discusses the critical data security challenges faced by enterprises, outlines regulatory, system‑level, and managerial risks, and shares practical strategies for building robust security governance, platform architecture, permission controls, and cloud‑based data protection.

Big Datacloud securitydata security
0 likes · 13 min read
Design and Practice of Big Data Platform Security: Insights from 360’s Data Center Technical Director
Zhongtong Tech
Zhongtong Tech
Dec 7, 2018 · Information Security

Designing a Cloud‑Native IAM for Zero‑Trust Security at a Leading Courier

This article explains how ZTO Express built a cloud‑native Identity and Access Management platform to support zero‑trust security, detailing business‑driven risk challenges, design goals, core modules such as identity space, account system, organization support, integration, authorization, micro‑service security, certificate management, automated auditing, and a mobile app.

Cloud NativeIAMIdentity Management
0 likes · 17 min read
Designing a Cloud‑Native IAM for Zero‑Trust Security at a Leading Courier
Tencent Cloud Developer
Tencent Cloud Developer
May 14, 2018 · Information Security

Analysis of a Hybrid DDoS Attack Leveraging TCP Reflection on Cloud Gaming Services

Tencent Cloud mitigated a 31‑minute, 194 Gbps hybrid DDoS attack on a cloud gaming service that combined typical SYN/ICMP floods with a rare TCP‑reflection component sending spoofed SYN/ACK packets to common service ports, primarily from Chinese IDC servers, prompting advanced filtering and cloud‑based mitigation recommendations.

DDoSGamingTCP reflection
0 likes · 10 min read
Analysis of a Hybrid DDoS Attack Leveraging TCP Reflection on Cloud Gaming Services
Tencent Cloud Developer
Tencent Cloud Developer
Mar 15, 2018 · Information Security

Cloud Security Solutions by Tencent

Tencent Cloud Security, led by Deputy Director Xu Dongshan, delivers a multi‑stage strategy—from monitoring partner services in the open platform era, to enforcing industry‑standard safeguards in public cloud, and offering targeted internet‑industry solutions—covering governance, physical, platform, compliance, network, host and application protection through flagship products Dayu (4 TB+ DDoS mitigation), Tianyu (anti‑scraping, content verification, captcha) and Legu (customizable mobile hardening).

Big YuDDoS protectionLe Fu
0 likes · 9 min read
Cloud Security Solutions by Tencent
iQIYI Technical Product Team
iQIYI Technical Product Team
Oct 13, 2017 · Industry Insights

How iQIYI Built a Cloud‑Native Risk Control Platform to Stop Credential Stuffing

iQIYI’s security cloud team designed a data‑driven, cloud‑native risk control platform that unifies threat detection, rule management, and security knowledge across membership, video, e‑commerce and payment services, achieving sub‑5 ms latency, 24 billion daily requests, and near‑complete elimination of machine credential‑stuffing attacks.

cloud securitydata-driven securityiQIYI
0 likes · 17 min read
How iQIYI Built a Cloud‑Native Risk Control Platform to Stop Credential Stuffing
Beike Product & Technology
Beike Product & Technology
Sep 30, 2017 · Information Security

Design and Implementation of OpenIAM: A Cloud Identity and Access Management Service Inspired by AWS IAM

The article describes the challenges of resource isolation and permission management in a microservice environment, explains AWS IAM concepts and policies, and details the design, development, and expected benefits of the internally built OpenIAM service for unified authentication and authorization across services.

AWSAccess ManagementIAM
0 likes · 9 min read
Design and Implementation of OpenIAM: A Cloud Identity and Access Management Service Inspired by AWS IAM
DevOps
DevOps
Aug 10, 2017 · Information Security

Securing VSTS with Azure Conditional Access: A Step‑by‑Step Guide

This article explains how to protect Visual Studio Team Services (VSTS) by integrating Azure Conditional Access, covering account binding, rule creation, user and group selection, condition settings such as sign‑in risk and location, and testing the resulting access restrictions.

Azure ADAzure Conditional AccessDevOps
0 likes · 6 min read
Securing VSTS with Azure Conditional Access: A Step‑by‑Step Guide
MaGe Linux Operations
MaGe Linux Operations
May 31, 2017 · Information Security

How I Uncovered a Critical LFI Vulnerability in Oracle Responsys Cloud Service

The article details the discovery of a local file inclusion (LFI) flaw in Oracle Responsys, explains how crafted requests exploit the _ri_ parameter to read arbitrary files, highlights the impact on major companies like Facebook and LinkedIn, and describes the responsible disclosure that led to a rapid patch.

LFILocal File InclusionOracle
0 likes · 4 min read
How I Uncovered a Critical LFI Vulnerability in Oracle Responsys Cloud Service
Meituan Technology Team
Meituan Technology Team
Apr 7, 2017 · Information Security

Insights on Google Infrastructure Security Design

Google’s new security white paper reveals how its deeply integrated, principle‑driven architecture—spanning physical data‑center safeguards, mutual‑authenticated multi‑tenant services, pervasive encryption, and a comprehensive DevSecOps process—enables massive‑scale protection, but replicating this model demands substantial custom hardware, unified tooling, and large‑scale engineering expertise.

Data ProtectionGoogleInfrastructure
0 likes · 22 min read
Insights on Google Infrastructure Security Design
Qunar Tech Salon
Qunar Tech Salon
Oct 17, 2016 · Information Security

Design and Implementation of a Cloud‑Based Web Application Firewall at Ctrip

This article describes Ctrip's challenges with web security, evaluates hardware and commercial cloud WAF shortcomings, and presents a low‑cost, low‑risk cloud‑based WAF solution that leverages DNS redirection, closed‑loop rule management, Lua/Tengine deployment, supervised machine‑learning log analysis, and big‑data streaming for real‑time threat detection and mitigation.

Big DataWAFWeb Security
0 likes · 9 min read
Design and Implementation of a Cloud‑Based Web Application Firewall at Ctrip
Ctrip Technology
Ctrip Technology
Oct 14, 2016 · Information Security

Design and Implementation of a Cloud-Based Web Application Firewall at Ctrip

This article describes Ctrip's challenges with traditional hardware and cloud WAFs, presents a low‑cost, DNS‑based cloud WAF solution, and details its closed‑loop design, rule management, big‑data analytics, and machine‑learning techniques for accurate web security protection.

Web Application Firewallcloud security
0 likes · 7 min read
Design and Implementation of a Cloud-Based Web Application Firewall at Ctrip
Efficient Ops
Efficient Ops
Feb 15, 2016 · Information Security

How to Secure Cloud Operations: Practical Strategies for Public Cloud Environments

This article reviews a decade of cloud security experience and outlines the key challenges of operations security in public cloud environments, offering concrete solutions such as VPC isolation, encrypted VPNs, RAM policies, Linux key‑based login, Windows RDP port changes, privileged‑account management, and ActionTrail auditing.

Alibaba Cloudbest practicescloud security
0 likes · 14 min read
How to Secure Cloud Operations: Practical Strategies for Public Cloud Environments
21CTO
21CTO
Oct 1, 2015 · Information Security

Why DDoS Attacks Still Threaten Everyone and How to Respond Quickly

This article explains what DDoS attacks are, highlights famous large‑scale incidents, examines their financial and reputational impact on businesses, and outlines practical mitigation strategies that cloud providers and organizations can adopt to detect and survive such attacks.

DDoSDistributed Denial of ServiceMitigation
0 likes · 7 min read
Why DDoS Attacks Still Threaten Everyone and How to Respond Quickly
Efficient Ops
Efficient Ops
Sep 22, 2015 · Information Security

How Tencent Cloud Defeats Massive DDoS Attacks in Seconds

This article explains how Tencent Cloud’s Dayu service mitigates large‑scale DDoS and CC attacks, using DNS redirection, traffic scrubbing nodes, and rapid 5‑second cleaning to keep services like Hammer Technology online during massive traffic spikes.

DDoSDNSTencent Cloud
0 likes · 10 min read
How Tencent Cloud Defeats Massive DDoS Attacks in Seconds