Tagged articles
12 articles
Page 1 of 1
AI Architect Hub
AI Architect Hub
Apr 7, 2026 · Artificial Intelligence

Defending Large Language Models Against Prompt Injection Attacks

This article explains the principles and common scenarios of prompt injection attacks on LLMs and provides practical defense strategies—including rule reinforcement, input filtering, output verification, and advanced techniques—to protect AI systems from malicious manipulation.

AI SafetyDefense StrategiesLLM Security
0 likes · 8 min read
Defending Large Language Models Against Prompt Injection Attacks
Black & White Path
Black & White Path
Mar 2, 2026 · Information Security

When Missiles Fall, Cyber Attack Countdown Starts: Iran’s Escalating Threat

As U.S. and Israeli forces target Iranian nuclear sites, analysts warn that Iran and its proxy hackers are poised to launch large‑scale cyber retaliation against critical U.S. and Israeli infrastructure, with sophisticated APT groups, upgraded attack methods, and high‑risk targets spanning energy, finance, and public utilities.

APTCyber WarfareDefense Strategies
0 likes · 9 min read
When Missiles Fall, Cyber Attack Countdown Starts: Iran’s Escalating Threat
Cognitive Technology Team
Cognitive Technology Team
Aug 24, 2025 · Information Security

How DoS Attacks Work and How to Defend Against Them

This article explains what denial‑of‑service (DoS) attacks are, describes their underlying principles and common variants such as SYN, UDP, ICMP, and HTTP floods, and outlines comprehensive defense strategies including firewalls, IDS, CDN, multi‑active architectures, SYN cookies, rate limiting, and cloud‑based protection services.

DDoSDefense StrategiesDenial of Service
0 likes · 9 min read
How DoS Attacks Work and How to Defend Against Them
Alimama Tech
Alimama Tech
Dec 25, 2024 · Artificial Intelligence

WiS Platform: Evaluating LLM Multi-Agent Systems via Game-Based Analysis

The WiS Platform provides a game‑based environment for benchmarking large language models in multi‑agent settings, measuring reasoning, deception and collaboration through dynamic scenarios, offering fair experimental design, real‑time competition, visualizations, detailed metrics, and open‑source tools, with GPT‑4o outperforming other models such as Qwen2.5‑72B‑Instruct.

AI EvaluationDefense StrategiesGame-Based Testing
0 likes · 8 min read
WiS Platform: Evaluating LLM Multi-Agent Systems via Game-Based Analysis
vivo Internet Technology
vivo Internet Technology
Mar 8, 2023 · Information Security

Web Cache Poisoning and HTTP Request Smuggling: Principles, Attack Scenarios, and Defenses

The article explains how misconfigured caches and inconsistent front‑end/back‑end parsing enable web cache poisoning and HTTP request smuggling attacks, illustrates practical exploitation scenarios, and recommends disabling caching, unifying request‑boundary logic, and adopting HTTP/2 or strict configurations to defend against these high‑impact threats.

Defense StrategiesHTTP request smugglingRequest Smuggling
0 likes · 16 min read
Web Cache Poisoning and HTTP Request Smuggling: Principles, Attack Scenarios, and Defenses
Efficient Ops
Efficient Ops
Dec 29, 2022 · Information Security

Mastering AD Domain Security: Attack Techniques and Defense Strategies

This article explains how Active Directory domains work, outlines over 220 attack techniques such as SPN scanning, password spraying, Kerberoasting, DCSync, and privilege‑escalation exploits, and then presents comprehensive defense measures including attack‑surface reduction, strict admin hygiene, network isolation, honeypots, and continuous monitoring.

Active DirectoryAttack TechniquesDefense Strategies
0 likes · 15 min read
Mastering AD Domain Security: Attack Techniques and Defense Strategies
Sohu Tech Products
Sohu Tech Products
Sep 7, 2022 · Information Security

Phishing Techniques: Theory, Classification, and Defense Strategies

The article provides a comprehensive overview of phishing as a social‑engineering attack, detailing its various techniques—including email deception, spear‑phishing, whaling, malware‑based lures, domain spoofing, vishing, SMS and QR‑code scams—and offers practical defense measures such as anti‑phishing tools, multi‑factor authentication, content filtering, and security standards.

Defense Strategiesemail securitymalware
0 likes · 14 min read
Phishing Techniques: Theory, Classification, and Defense Strategies
Tencent Cloud Developer
Tencent Cloud Developer
May 17, 2018 · Information Security

Analysis of the Record‑Breaking 1.23 Tbps DDoS Attack Mitigated by Tencent Cloud

On April 8, a record‑breaking 1.23 Tbps DDoS attack—dominated by SSDP reflection and launched by roughly 166 000 mostly Chinese sources, including PCs, IDC servers and IoT devices—targeted a Tencent Cloud‑hosted game, prompting the article to urge operators to assess risk, adopt high‑protection services, conceal origin IPs, and tailor defense policies with expert assistance.

DDoSDefense StrategiesGame Security
0 likes · 7 min read
Analysis of the Record‑Breaking 1.23 Tbps DDoS Attack Mitigated by Tencent Cloud
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Aug 29, 2017 · Information Security

Rethinking Web Security: A Front‑End Perspective on Attack and Defense

From a front‑end engineer’s viewpoint, this article dissects web security as a holistic system, examines attack motives, targets, and vectors across browsers, transmission channels, and servers, and proposes coordinated front‑end and back‑end defenses such as encryption, signing, XSS filtering, URL whitelisting, and CSRF mitigation.

Defense Strategiesattack vectorsfrontend
0 likes · 14 min read
Rethinking Web Security: A Front‑End Perspective on Attack and Defense
dbaplus Community
dbaplus Community
Apr 4, 2017 · Information Security

Mastering Database Injection: Real‑World Attacks, Tools, and Defense Strategies

This comprehensive guide explains why database injection remains a critical security threat, illustrates real‑world attack techniques and toolchains, and provides layered defensive measures—from secure coding and DB‑proxy solutions to web‑server filtering, WAF deployment, and log‑analysis pipelines.

Database SecurityDefense StrategiesSQL injection
0 likes · 24 min read
Mastering Database Injection: Real‑World Attacks, Tools, and Defense Strategies
ITPUB
ITPUB
Jul 20, 2016 · Information Security

Dissecting the XOR.DDoS Linux Trojan: Sample, Crontab Abuse, and Defense Steps

This article examines the XOR.DDoS Linux trojan (sample 101), detailing how it hijacks crontab to launch malicious scripts, the forensic clues left in system logs, and a step‑by‑step emergency removal procedure, while also discussing its polymorphic nature and the broader challenges of defending against such malware.

Defense StrategiesLinux trojanXOR.DDoS
0 likes · 10 min read
Dissecting the XOR.DDoS Linux Trojan: Sample, Crontab Abuse, and Defense Steps
Architect
Architect
Nov 5, 2015 · Information Security

Comprehensive Overview of DDoS Attack Types and Multi‑Layer Defense Strategies

This article provides a detailed classification of DDoS attacks—including network‑layer, application‑layer, hybrid, reflection, pulse, and link‑flooding methods—and outlines a four‑layer defense architecture (ISP/WAN, CDN/Internet, Data‑Center, OS/APP) along with practical mitigation techniques and considerations for different enterprise sizes.

Attack TypesDDoSDefense Strategies
0 likes · 24 min read
Comprehensive Overview of DDoS Attack Types and Multi‑Layer Defense Strategies