Tagged articles
138 articles
Page 2 of 2
Tencent Cloud Developer
Tencent Cloud Developer
Mar 29, 2021 · Information Security

What Is Zero Trust? Benefits, Technologies, and Deployment Guide

This article explains the Zero Trust security model, its advantages over traditional perimeter defenses, core technologies such as SDP, IAM, and micro‑segmentation, implementation principles, essential components, real‑world deployment scenarios, future trends, and Tencent's practical contributions to the industry.

IAMSDPZero Trust
0 likes · 16 min read
What Is Zero Trust? Benefits, Technologies, and Deployment Guide
Practical DevOps Architecture
Practical DevOps Architecture
Mar 5, 2021 · Information Security

Zhou Hongyi's 2021 Two‑Session Proposals on Cybersecurity Talent Incentives, Smart Vehicle Security, and City‑Level Security Infrastructure

In his 2021 Two‑Session submission, Zhou Hongyi, founder of 360, urges the Chinese government to recognize and incentivize elite hackers, strengthen cybersecurity for connected cars, and build city‑level security infrastructure to protect smart‑city systems, outlining concrete policy recommendations for each area.

city infrastructurecybersecuritypolicy
0 likes · 8 min read
Zhou Hongyi's 2021 Two‑Session Proposals on Cybersecurity Talent Incentives, Smart Vehicle Security, and City‑Level Security Infrastructure
Programmer DD
Programmer DD
Jan 9, 2021 · Information Security

Is JetBrains Behind the SolarWinds Hack? Unpacking the Investigation

JetBrains, the maker of IntelliJ IDEA and Kotlin, is under U.S. security scrutiny for a possible link to the SolarWinds supply‑chain breach, with officials questioning a TeamCity vulnerability while the company denies involvement and cites misconfiguration as the likely cause.

JetBrainsSolarWindsTeamCity
0 likes · 4 min read
Is JetBrains Behind the SolarWinds Hack? Unpacking the Investigation
21CTO
21CTO
Jan 1, 2021 · Information Security

Did Hackers Peek into Microsoft’s Source Code? Insights from the SolarWinds Attack

A recent SolarWinds breach gave hackers read‑only access to Microsoft’s internal source‑code repositories, prompting the company to stress that no production systems or user data were compromised while highlighting broader security implications for the software industry.

MicrosoftSolarWindscybersecurity
0 likes · 5 min read
Did Hackers Peek into Microsoft’s Source Code? Insights from the SolarWinds Attack
Top Architect
Top Architect
Dec 21, 2020 · Operations

Weekly Tech News Digest: Google Outage, Linux 5.10, Docker Desktop 3.0, AI‑Piloted Aircraft and More

This week’s tech roundup covers Google’s two‑day service outage, the removal of over 60% of Pornhub videos, the launch of Rocky Linux, Linus Torvalds’ kernel submission deadline, Docker Desktop 3.0 updates, AI‑controlled U‑2 flight, major antitrust fines and the release of HarmonyOS 2.0 Beta, among other industry highlights.

AIDockerGoogle outage
0 likes · 12 min read
Weekly Tech News Digest: Google Outage, Linux 5.10, Docker Desktop 3.0, AI‑Piloted Aircraft and More
21CTO
21CTO
Dec 13, 2020 · Information Security

Inside the Dark Web: How MySQL Databases Are Ransomed for $500

Over 85,000 MySQL databases are being sold on the dark web for around $500 each, with attackers automating ransom notices via portals on sqldb.to and dbrestore.to, demanding Bitcoin payments, auctioning unpaid data after nine days, and targeting a range of database platforms since 2017.

Bitcoincybersecuritydark web
0 likes · 4 min read
Inside the Dark Web: How MySQL Databases Are Ransomed for $500
Architects Research Society
Architects Research Society
Nov 29, 2020 · Information Security

AI and Machine Learning Threats to Autonomous Vehicles and Drones: Security Risks and Attack Vectors

A UN, Interpol and Trend Micro report warns that cyber criminals can exploit artificial intelligence and machine learning to launch attacks on autonomous cars, drones and IoT vehicles, potentially causing physical harm, traffic disruption, and data theft, highlighting urgent security challenges for emerging technologies.

AI securityIoT threatsautonomous vehicles
0 likes · 5 min read
AI and Machine Learning Threats to Autonomous Vehicles and Drones: Security Risks and Attack Vectors
Laravel Tech Community
Laravel Tech Community
Nov 11, 2020 · Information Security

Bitcoin Ransomware Cases and Police Crackdown in China

The article describes how Bitcoin‑based ransomware such as WannaRen encrypts victims' files, the large‑scale attacks on Chinese enterprises and institutions, the police investigations that led to the arrest of the mastermind Ju Mou and his accomplices, and practical advice for preventing such threats.

BitcoinData Recoverycybersecurity
0 likes · 7 min read
Bitcoin Ransomware Cases and Police Crackdown in China
Architects Research Society
Architects Research Society
Aug 12, 2020 · Information Security

12 Best Cybersecurity Practices for 2019

This article outlines twelve essential cybersecurity best practices for 2019, covering biometric security, tiered policies, risk‑based approaches, data backup, IoT protection, multi‑factor authentication, password management, least‑privilege principles, privileged‑user monitoring, third‑party access control, phishing defense, and employee awareness to safeguard sensitive data.

Data ProtectionMulti-Factor Authenticationbest practices
0 likes · 22 min read
12 Best Cybersecurity Practices for 2019
Liangxu Linux
Liangxu Linux
Aug 5, 2020 · Information Security

How to Check If Your Accounts Were Sold on the Dark Web and Secure Them

The article lists major 2020 data‑breach incidents worldwide, explains how to use HaveIBeenPwned to discover whether your credentials have been exposed, and offers practical advice on password hygiene and reliable password‑manager tools to protect your online accounts.

cybersecuritydata breachhaveibeenpwned
0 likes · 5 min read
How to Check If Your Accounts Were Sold on the Dark Web and Secure Them
Tencent Cloud Developer
Tencent Cloud Developer
Jul 31, 2020 · Information Security

Tencent Cloud Wins IPv6 Best Practice Award for Network Security Solutions

Tencent Cloud’s T‑Sec Network Intrusion Prevention System and SCDN Security Acceleration Product earned the IPv6 Best Practice Award at the 2020 Global IPv6 Summit, recognizing their advanced kernel‑level security computing, AI‑driven threat detection, and support for China’s large‑scale IPv6 digital infrastructure transformation.

AI AlgorithmsDigital InfrastructureIPv6
0 likes · 9 min read
Tencent Cloud Wins IPv6 Best Practice Award for Network Security Solutions
Tencent Cloud Developer
Tencent Cloud Developer
Jul 27, 2020 · Information Security

Tencent Game Security 2019 Annual Report: Cheating, Black Markets, and Account Security Trends

The 2019 Tencent Game Security report reveals rising cheat samples on PC and mobile, dominant custom cheats, emerging subtle cheating tactics, a diversified black‑market selling fake IDs and compromised devices, rampant account theft largely through scams, and improved player reporting that boosted detection rates.

Game SecurityGaming IndustryTencent
0 likes · 9 min read
Tencent Game Security 2019 Annual Report: Cheating, Black Markets, and Account Security Trends
Efficient Ops
Efficient Ops
May 14, 2020 · Operations

Why Is the Average IT Operations Salary Below 10K? Market Trends and Key Updates

This article reviews the low average IT operations salary in China, highlights IDC's public cloud market report, examines Huawei's GaussDB shutdown, details AI server market shares, announces Debian 10.4 updates, and summarizes major tech industry news including Tencent's earnings, Microsoft‑Oracle's $10 billion cloud contract, and recent security incidents.

AI serversCloud MarketDebian
0 likes · 10 min read
Why Is the Average IT Operations Salary Below 10K? Market Trends and Key Updates
Efficient Ops
Efficient Ops
Jan 16, 2020 · Information Security

What Are the Top 10 Cybersecurity Threats Predicted for 2020?

The article outlines ten major 2020 cybersecurity forecasts—including surging ransomware, sophisticated phishing, faster threat detection, expanding attack surfaces, emerging IoT security laws, stricter GDPR enforcement, OT security challenges, and the rise of managed security services—to help organizations prepare for the evolving threat landscape.

2020cybersecurityinformation security
0 likes · 13 min read
What Are the Top 10 Cybersecurity Threats Predicted for 2020?
Tencent Cloud Developer
Tencent Cloud Developer
Nov 15, 2019 · Information Security

Understanding China’s Cybersecurity Graded Protection System (GB/T 22239‑2019) 2.0: Key Changes, Assessment Process, and Enterprise Guidance

China’s mandatory Cybersecurity Graded Protection System 2.0, effective Dec 1 2019, classifies information systems into five security levels, imposes legally enforceable technical and management controls—including encryption, trusted computing, and cloud requirements—and outlines a five‑step assessment, registration, remediation, and supervision process for enterprises to achieve compliance quickly.

Data Protectioncloud securitycompliance
0 likes · 15 min read
Understanding China’s Cybersecurity Graded Protection System (GB/T 22239‑2019) 2.0: Key Changes, Assessment Process, and Enterprise Guidance
Alibaba Cloud Developer
Alibaba Cloud Developer
Oct 29, 2019 · Artificial Intelligence

Can AI Finally Master Cybersecurity? Exploring the Future of Intelligent Defense

This article examines the evolution of machine intelligence, the role of general‑purpose technologies, the shift from data‑driven to intelligent‑driven security, the core paradigm of autonomous systems, and proposes a six‑level maturity model (L0‑L5) for truly intelligent cybersecurity solutions.

General Purpose Technologyartificial intelligencecybersecurity
0 likes · 23 min read
Can AI Finally Master Cybersecurity? Exploring the Future of Intelligent Defense
Alibaba Cloud Developer
Alibaba Cloud Developer
Oct 23, 2019 · Artificial Intelligence

Why Machine Intelligence Struggles in Cybersecurity: Core Paradigms

The article examines the fundamental nature of machine intelligence, its historical development, the shift from data‑driven to intelligence‑driven approaches, and why current AI techniques still fall short in cybersecurity, proposing a four‑component paradigm and a six‑level maturity model for truly intelligent security systems.

General Purpose TechnologiesSecurityartificial intelligence
0 likes · 23 min read
Why Machine Intelligence Struggles in Cybersecurity: Core Paradigms
Architects Research Society
Architects Research Society
Sep 21, 2019 · Information Security

12 Best Cybersecurity Practices for 2019

This article outlines twelve essential cybersecurity practices for 2019, covering biometric authentication, tiered security policies, risk‑based approaches, regular backups, IoT security, multi‑factor authentication, password management, least‑privilege principles, privileged‑user monitoring, third‑party access control, phishing awareness, and employee training.

Data ProtectionMFAbest practices
0 likes · 18 min read
12 Best Cybersecurity Practices for 2019
360 Tech Engineering
360 Tech Engineering
Aug 19, 2019 · Information Security

Highlights of the 7th Internet Security Conference: Global Collaboration and Emerging Cybersecurity Challenges

The 7th Internet Security Conference in Beijing gathered international experts to discuss the merging of cyberspace and physical space, the heightened impact of 5G and industrial IoT on cyber attacks, and collaborative strategies among China, Israel, Russia, and Singapore to build a comprehensive security ecosystem.

5GInternational Cooperationconference
0 likes · 8 min read
Highlights of the 7th Internet Security Conference: Global Collaboration and Emerging Cybersecurity Challenges
21CTO
21CTO
May 17, 2019 · Artificial Intelligence

Why AI Needs Human Ethics: Key Takeaways from Zhou Hongyi’s Summit Speech

In a recent World Intelligence Summit address, Zhou Hongyi warned that AI systems lacking humanistic thinking can become tragic, raised ethical questions about control of unmanned systems and facial‑recognition flaws, and urged pre‑launch security testing by hacker firms while announcing a new cybersecurity hub in Tianjin.

AI ethicsTechnology Governanceartificial intelligence
0 likes · 3 min read
Why AI Needs Human Ethics: Key Takeaways from Zhou Hongyi’s Summit Speech
Efficient Ops
Efficient Ops
Apr 23, 2019 · Information Security

How Situational Awareness Transforms Modern Cybersecurity Defense

The article explains how situational awareness—covering pre‑attack, during‑attack, and post‑attack stages—leverages big data, AI, threat intelligence, UEBA and visualization to turn security platforms into proactive “security brains,” while also critiquing current product implementations and market practices.

Big DataUEBAcybersecurity
0 likes · 14 min read
How Situational Awareness Transforms Modern Cybersecurity Defense
MaGe Linux Operations
MaGe Linux Operations
Jan 14, 2019 · Information Security

Explore the Complete Network Security Mind Map: From Basics to Advanced Defenses

This article presents a comprehensive collection of network security mind maps covering introductory concepts, scanning and defense techniques, monitoring, password cracking, deception attacks, denial-of-service, buffer overflow, web, trojan, virus threats, and future trends, guiding learners through a structured technical roadmap.

cybersecuritydefense techniquesinformation security
0 likes · 3 min read
Explore the Complete Network Security Mind Map: From Basics to Advanced Defenses
Meituan Technology Team
Meituan Technology Team
Nov 8, 2018 · Information Security

Intrusion Detection: Concepts, Challenges, and Best Practices

Effective intrusion detection for large enterprises hinges on combining signature‑based pattern matching with baseline anomaly modeling, gathering comprehensive host and network logs, focusing on the GetShell foothold, managing alert fatigue, and integrating AI‑enhanced feature engineering while maintaining robust operational foundations and continuous expertise development.

AISecurity Operationscybersecurity
0 likes · 31 min read
Intrusion Detection: Concepts, Challenges, and Best Practices
21CTO
21CTO
Nov 7, 2018 · Artificial Intelligence

What Top Tech Leaders Revealed About AI, 5G, and the Future of the Internet

At the World Internet Conference in Wuzhen, leading figures such as Ma Huateng, Shen Xiangyang, Shen Nanpeng, Lei Jun, Steve Mollenkopf, Zhou Hongyi, Sun Pishu, Jing Xiandong, and Eugene Kaspersky shared insights on deep‑water internet challenges, AI's pivotal role, mobile‑first strategies, blockchain trust, and evolving cybersecurity, outlining the next era of digital transformation.

5GAIInternet Trends
0 likes · 12 min read
What Top Tech Leaders Revealed About AI, 5G, and the Future of the Internet
JD Tech
JD Tech
Sep 7, 2018 · Information Security

Big Data and AI Security Insights from ISC 2018 Conference

The ISC 2018 conference highlighted the growing importance of big data and artificial intelligence security, presenting JD's research on anti‑scraping techniques, AI‑driven defenses against black‑market attacks, and a service‑oriented approach to protecting user data across enterprises.

AI securityBig Dataanti-scraping
0 likes · 5 min read
Big Data and AI Security Insights from ISC 2018 Conference
Big Data and Microservices
Big Data and Microservices
Jul 29, 2018 · Industry Insights

Top 5 Big Data & AI Trends Shaping 2018 and Beyond

According to recent Forrester and Forbes reports, 2018 will see AI overtaking big-data hype, driving five key trends—from heightened cybersecurity in healthcare to expanded IoT, plug-and-play AI solutions, the rise of chief digital officers, and smarter community policing—each reshaping how organizations leverage data.

AI trendsBig DataIndustry analysis
0 likes · 8 min read
Top 5 Big Data & AI Trends Shaping 2018 and Beyond
Tencent Cloud Developer
Tencent Cloud Developer
Jul 4, 2018 · Information Security

2018 H1 Gaming Industry DDoS Attack Landscape and Mitigation Recommendations

In the first half of 2018, the gaming industry faced a dramatic rise in DDoS attacks—accounting for nearly 40% of incidents and reaching a 1.23 Tbps peak on Tencent Cloud—driven largely by UDP‑based and MEMCACHED reflection floods, prompting comprehensive mitigation strategies such as BGP high‑defense, traffic filtering, and industry‑specific protections.

Attack TrendsDDoSGaming Industry
0 likes · 15 min read
2018 H1 Gaming Industry DDoS Attack Landscape and Mitigation Recommendations
Tencent Cloud Developer
Tencent Cloud Developer
Jun 13, 2018 · Information Security

Analysis of DDoS Attack Trends in the First Half of 2018

In the first half of 2018 DDoS attacks surged, with IoT‑based SSDP and newly dominant Memcached reflection amplifications reaching 1.7 Tbps, gaming becoming the top‑targeted sector, SYN and HTTP floods rising, attack infrastructure shifting abroad, and automated, low‑cost services enabling teenage operators, prompting recommendations for high‑bandwidth cloud and BGP defenses.

Attack TrendsDDoSThreat analysis
0 likes · 13 min read
Analysis of DDoS Attack Trends in the First Half of 2018
Beike Product & Technology
Beike Product & Technology
May 18, 2018 · Information Security

DEFCON China 2018: Event Report and Highlights

The article reports on DEFCON China 2018 held in Beijing, describing the conference’s significance, keynotes by Jeff Moss, diverse security topics ranging from mobile and system security to deep‑learning workshops, detailed accounts of specific talks on account hijacking and decentralized networks, and the cultural aspects such as badge colors and puzzles.

DEFCONEvent ReportWorkshops
0 likes · 6 min read
DEFCON China 2018: Event Report and Highlights
MaGe Linux Operations
MaGe Linux Operations
Sep 19, 2017 · Information Security

Master Network Security: A Complete Mind Map of Threats & Defenses

This article presents a detailed mind‑map of network security, covering introductory concepts, scanning and defense, monitoring, password cracking, deception attacks, denial‑of‑service, buffer overflow, web and trojan attacks, computer viruses, and future trends, each illustrated with explanatory images.

Threat Detectioncybersecuritydefense techniques
0 likes · 3 min read
Master Network Security: A Complete Mind Map of Threats & Defenses
Architecture Digest
Architecture Digest
Apr 1, 2016 · Information Security

Understanding DDoS: A Resource War, Emerging Trends, and Defense Strategies

The article explains what Distributed Denial of Service (DDoS) attacks are, why they are a persistent resource‑war in cyberspace, outlines new hybrid attack trends, the expanding range of compromised devices, and discusses evolving defense approaches from local cleaning to cloud‑based anti‑DDoS services.

Anti-DDoSAttack TrendsDDoS
0 likes · 11 min read
Understanding DDoS: A Resource War, Emerging Trends, and Defense Strategies
Efficient Ops
Efficient Ops
Feb 28, 2016 · Information Security

How Much Do Hackers Spend and Earn? A Deep Dive into Cybercrime Economics

This article breaks down the monthly expenses hackers incur for tools, services, and infrastructure, then reveals how much they can earn through ransomware, malicious certificates, fake antivirus, IP reputation abuse, web shells, and user data trading, highlighting the lucrative yet risky nature of cybercrime.

cybersecuritydata theftdigital certificates
0 likes · 9 min read
How Much Do Hackers Spend and Earn? A Deep Dive into Cybercrime Economics
21CTO
21CTO
Oct 1, 2015 · Information Security

Why DDoS Attacks Still Threaten Everyone and How to Respond Quickly

This article explains what DDoS attacks are, highlights famous large‑scale incidents, examines their financial and reputational impact on businesses, and outlines practical mitigation strategies that cloud providers and organizations can adopt to detect and survive such attacks.

DDoSDistributed Denial of ServiceMitigation
0 likes · 7 min read
Why DDoS Attacks Still Threaten Everyone and How to Respond Quickly
MaGe Linux Operations
MaGe Linux Operations
Sep 21, 2015 · Information Security

How ADS Turns the Tide Against DDoS Attacks: Real Cases and Detection Techniques

The article explains what DDoS attacks are, illustrates real incidents like the Hammer phone launch and Apple iPhone 6s pre‑order outage, and details how the ADS solution uses anti‑spoofing, protocol analysis, behavior profiling, dynamic fingerprinting, and bandwidth control to accurately identify and mitigate malicious traffic.

ADSDDoSTraffic analysis
0 likes · 5 min read
How ADS Turns the Tide Against DDoS Attacks: Real Cases and Detection Techniques