Tagged articles
980 articles
Page 2 of 10
21CTO
21CTO
Dec 2, 2025 · Information Security

What Let’s Encrypt’s New Certificate Validity Rules Mean for Your SSL Setup

Let’s Encrypt will shorten default TLS/SSL certificate lifetimes from 90 to 45 days and reduce domain‑validation reuse windows to seven hours, rolling out a trial in May 2026, a default change in July 2027, and full enforcement in August 2028, while also introducing a persistent DNS‑TXT validation method.

ACMELet’s EncryptSSL
0 likes · 4 min read
What Let’s Encrypt’s New Certificate Validity Rules Mean for Your SSL Setup
DevOps in Software Development
DevOps in Software Development
Dec 1, 2025 · Information Security

Why Trusted Component Repositories Are Critical for Military Software Security

The article examines how modern military software, built largely from third‑party components, faces supply‑chain attacks, explains the need for SBOMs, and proposes a centralized trusted component repository with automated scanning, compliance checks, and full‑lifecycle auditing to secure defense systems.

DevOpsSBOMVulnerability Management
0 likes · 8 min read
Why Trusted Component Repositories Are Critical for Military Software Security
Xiao Liu Lab
Xiao Liu Lab
Nov 26, 2025 · Information Security

Why SecureCRT Fails on New Linux and How to Fix It

After upgrading to recent Linux distributions, SecureCRT often cannot establish SSH connections due to disabled legacy algorithms, but the issue can be resolved by updating SecureCRT or manually enabling modern key‑exchange and host‑key types in its settings.

LinuxSSHSecureCRT
0 likes · 4 min read
Why SecureCRT Fails on New Linux and How to Fix It
Continuous Delivery 2.0
Continuous Delivery 2.0
Nov 21, 2025 · Information Security

How Google, Microsoft, and Meta Are Shaping SBOM Practices for Secure Software Supply Chains

This article examines the distinct SBOM strategies of Google, Microsoft, and Meta, highlighting Google's large‑scale automation, Microsoft's open‑source tooling, and Meta's internal security integration, and draws lessons for enterprises seeking transparent and resilient software supply chain governance.

Cloud NativeDevOpsOpen standards
0 likes · 10 min read
How Google, Microsoft, and Meta Are Shaping SBOM Practices for Secure Software Supply Chains
Su San Talks Tech
Su San Talks Tech
Nov 13, 2025 · Information Security

Designing Scalable Permission Systems: From Basic RBAC to Advanced Role Hierarchies

This article explains why permission management is essential, outlines basic and advanced permission models—including RBAC, role inheritance, constraints, user groups, organizations, and positions—and provides detailed table designs for both standard and ideal RBAC implementations, helping developers build scalable, secure access control systems.

Database designPermission DesignRBAC
0 likes · 18 min read
Designing Scalable Permission Systems: From Basic RBAC to Advanced Role Hierarchies
AntTech
AntTech
Nov 3, 2025 · Information Security

What Does the New IEEE 3169‑2025 Standard Mean for Privacy‑Preserving Computation Security?

The IEEE 3169‑2025 standard, led by Ant Group, introduces a unified five‑level security grading framework for privacy‑preserving computation across technologies like MPC, federated learning and TEEs, detailing attack‑defense effectiveness, information leakage categories, and additional metrics to guide secure data‑flow implementations.

IEEE 3169data securityinformation security
0 likes · 6 min read
What Does the New IEEE 3169‑2025 Standard Mean for Privacy‑Preserving Computation Security?
Xiao Liu Lab
Xiao Liu Lab
Nov 2, 2025 · Information Security

Automate Linux Password Expiration for GB/T 22239 Compliance (90‑Day Policy)

This guide presents a complete, compliance‑ready solution for enforcing the GB/T 22239 (等保2.0) requirement that Linux user passwords be changed every 90 days, including a safe Bash script, audit logging, crontab scheduling, permission hardening, and evidence collection for security assessments.

BashCompliance Automationinformation security
0 likes · 8 min read
Automate Linux Password Expiration for GB/T 22239 Compliance (90‑Day Policy)
Ray's Galactic Tech
Ray's Galactic Tech
Oct 26, 2025 · Information Security

How to Build a Full‑Featured Network Security Shell Script Library

This guide presents a comprehensive network security shell script library, outlining modular design principles, a categorized inventory of over 180 scripts for reconnaissance, vulnerability scanning, monitoring, incident response, credential management, automation, and utility tools, along with practical build strategies and usage tips for secure, portable deployments.

Shell Scriptsinformation securitynetwork security
0 likes · 12 min read
How to Build a Full‑Featured Network Security Shell Script Library
Efficient Ops
Efficient Ops
Oct 22, 2025 · Information Security

NSA‑Backed Attack on China’s Time‑keeping Center: Weapons, Tactics, Findings

The Chinese National Time Service Center revealed a sophisticated cyber‑attack attributed to the U.S. NSA, detailing the deployment of multiple custom malware families—including Back_eleven, eHome_0cx, and New_Dsz_Implant—used for data theft, persistent footholds, encrypted tunneling, lateral movement, and command‑and‑control via numerous IP addresses.

Cyber EspionageNSAinformation security
0 likes · 8 min read
NSA‑Backed Attack on China’s Time‑keeping Center: Weapons, Tactics, Findings
AntTech
AntTech
Oct 16, 2025 · Information Security

How Alipay’s Trusted Deep Defense System Secures Financial Transactions

Alipay’s trusted deep defense architecture, built on security parallel slices and trusted computing, was selected as a flagship case for the 2025 Important Industry Security Protection list, demonstrating zero‑false‑positive, zero‑miss, and zero‑business‑disruption protection against advanced threats such as 0‑day and APT attacks during high‑traffic events like Double 11.

Deep DefenseZero Trustcybersecurity
0 likes · 5 min read
How Alipay’s Trusted Deep Defense System Secures Financial Transactions
Efficient Ops
Efficient Ops
Oct 12, 2025 · Information Security

What Exposed the AI Companion Apps? A Deep Dive into the Massive Data Leak

A recent breach of the AI companion apps Chattee and GiMe Chat exposed over 40 million private conversations, hundreds of thousands of media files, and transaction records due to publicly accessible Kafka brokers lacking any authentication, putting user privacy and security at serious risk.

AI securityKafkadata breach
0 likes · 3 min read
What Exposed the AI Companion Apps? A Deep Dive into the Massive Data Leak
Open Source Linux
Open Source Linux
Oct 10, 2025 · Information Security

How Can Companies Prevent Employees from Leaking Source Code? Strategies and Realities

The article explores how companies can safeguard source code from employee leaks, discussing strategies ranging from generous compensation and strict permission controls to advanced sandbox and virtualization solutions, while also weighing the true commercial value of proprietary code and the cost‑benefit of heavy security measures.

Virtualizationaccess controlinformation security
0 likes · 5 min read
How Can Companies Prevent Employees from Leaking Source Code? Strategies and Realities
Java Tech Enthusiast
Java Tech Enthusiast
Oct 9, 2025 · Fundamentals

How QR Codes Power Modern Life: From Barcodes to Global Data Streams

This article explores the evolution of QR codes from their barcode origins, explains how their two‑dimensional matrix stores massive information, describes the standards and error‑correction mechanisms that make them reliable, and examines the massive data, energy, and security challenges they create in today’s digital society.

Data EncodingDigital InfrastructureQR code
0 likes · 11 min read
How QR Codes Power Modern Life: From Barcodes to Global Data Streams
Liangxu Linux
Liangxu Linux
Oct 1, 2025 · Information Security

How Can Companies Prevent Employees from Leaking Source Code? Practical Strategies

This article compiles several expert answers on protecting corporate source code from employee leakage, covering monetary incentives, permission segmentation, strict auditing, sandbox/virtualization solutions, cost‑benefit considerations, and why most internal code may not be worth heavy protection.

Virtualizationaccess controlaudit
0 likes · 6 min read
How Can Companies Prevent Employees from Leaking Source Code? Practical Strategies
Architect's Guide
Architect's Guide
Sep 30, 2025 · Information Security

Are Software Backdoors Legal? Real Cases, Legal Views, and Hidden Threats

This article examines real‑world anecdotes of hidden backdoors in software, explores how Chinese law treats such vulnerabilities, and outlines the hierarchy of backdoor techniques from simple code tricks to compiler‑level implants, highlighting the security risks they pose.

Software Securitybackdoorcompiler
0 likes · 6 min read
Are Software Backdoors Legal? Real Cases, Legal Views, and Hidden Threats
Architect
Architect
Sep 28, 2025 · Information Security

How to Perform Fuzzy Searches on Encrypted Data: Practical Approaches

This article examines three categories of techniques—naïve, conventional, and advanced—for enabling fuzzy queries on encrypted data, evaluates their pros and cons, provides implementation details, performance considerations, and references to real‑world solutions, guiding developers toward secure and efficient search strategies.

databaseencrypted datafuzzy-search
0 likes · 12 min read
How to Perform Fuzzy Searches on Encrypted Data: Practical Approaches
IT Services Circle
IT Services Circle
Sep 14, 2025 · Information Security

When a Girlfriend’s Social Post Leads to a Tech Giant’s Dismissal: Lessons on Information Security

A Shenzhen tech employee was fired after his girlfriend posted his badge and 3‑million‑yuan salary online, sparking a debate about strict corporate data protection, internal reporting mechanisms, and the broader responsibilities of both companies and individuals in safeguarding sensitive information.

Tech Industrycorporate policydata leakage
0 likes · 4 min read
When a Girlfriend’s Social Post Leads to a Tech Giant’s Dismissal: Lessons on Information Security
Lobster Programming
Lobster Programming
Sep 13, 2025 · Information Security

Mobile SMS Verification Login: How It Works and How to Secure It

This article explains the workflow of mobile SMS verification login, outlines its main security risks such as code leakage, SMS bombing, and replay attacks, and provides practical mitigation strategies for developers and platform operators to protect user accounts.

AuthenticationSMS Verificationinformation security
0 likes · 6 min read
Mobile SMS Verification Login: How It Works and How to Secure It
Code Wrench
Code Wrench
Sep 12, 2025 · Information Security

Master Secure Go Cryptography: Common Pitfalls & Best Practices

This article provides a comprehensive guide to Go cryptography, covering fundamental concepts, common mistakes like using math/rand for keys or RSA v1.5 padding, correct implementations with crypto/rand, AES‑GCM, RSA‑OAEP/PSS, password‑derived keys, performance benchmarks, and practical testing strategies.

AESGoRSA
0 likes · 12 min read
Master Secure Go Cryptography: Common Pitfalls & Best Practices
FunTester
FunTester
Sep 10, 2025 · Information Security

How Data Masking Protects Privacy: Techniques, Stages, and Future Challenges

This article explains data masking (data desensitization), its importance for privacy and compliance, outlines the four implementation stages, compares common masking techniques, and discusses the challenges and future directions for secure data handling in development and testing.

Data ProtectionGDPRdata masking
0 likes · 7 min read
How Data Masking Protects Privacy: Techniques, Stages, and Future Challenges
Ops Development & AI Practice
Ops Development & AI Practice
Sep 6, 2025 · Information Security

Endogenous Security: Creating Self‑Protecting Systems Beyond the Fortress Model

The article redefines security by introducing the concept of endogenous security, explaining its origins, biological analogy, core characteristics, and how it synergizes with DevSecOps to embed self‑protecting, adaptive immunity directly into software and infrastructure rather than relying on external defenses.

DevSecOpsEndogenous SecurityProactive Defense
0 likes · 8 min read
Endogenous Security: Creating Self‑Protecting Systems Beyond the Fortress Model
Ops Development & AI Practice
Ops Development & AI Practice
Sep 2, 2025 · Information Security

How XSS Bypasses Browser Sandboxes and What You Can Do About It

Even though modern browsers enforce sandboxing and many frameworks add XSS defenses, a successful cross‑site scripting attack can still break through server and browser protections, allowing attackers to hijack sessions, steal data, scan internal networks, exploit browser bugs, or run cryptojacking scripts.

Browser SecurityCSPCryptojacking
0 likes · 9 min read
How XSS Bypasses Browser Sandboxes and What You Can Do About It
Volcano Engine Developer Services
Volcano Engine Developer Services
Aug 27, 2025 · Information Security

How Volcano Engine Secures MCP OAuth: Multi‑Layer Defense Against Token Theft

This article examines the OAuth security challenges in Volcano Engine's Model Context Protocol (MCP) ecosystem and outlines a comprehensive, three‑stage defense strategy—including pre‑authorization double confirmation, token identity isolation, and API‑level permission controls—to protect user assets and data.

Defense in DepthMCPOAuth
0 likes · 13 min read
How Volcano Engine Secures MCP OAuth: Multi‑Layer Defense Against Token Theft
Software Development Quality
Software Development Quality
Aug 21, 2025 · Information Security

Essential Data Security Red Lines: What Every Employee Must Follow

This document outlines the background, scope, key definitions, and strict data security red lines that all employees must adhere to, including prohibitions on bypassing security measures, unauthorized data use, external disclosures, cross‑border transfers, and requirements for handling sensitive information.

Data Protectioncompliancedata security
0 likes · 4 min read
Essential Data Security Red Lines: What Every Employee Must Follow
Raymond Ops
Raymond Ops
Aug 10, 2025 · Information Security

Master Linux Account Security: PAM, sudo, and GRUB Hardening Techniques

This guide walks you through essential Linux security measures—including system account cleanup, password policies, command history restrictions, PAM authentication modules, sudo configuration, GRUB boot protection, weak‑password detection with John the Ripper, and network port scanning with nmap—to help you harden servers against unauthorized access and privilege escalation.

GRUBPassword policySudo
0 likes · 21 min read
Master Linux Account Security: PAM, sudo, and GRUB Hardening Techniques
Swan Home Tech Team
Swan Home Tech Team
Jul 21, 2025 · Information Security

Phishing & Ransomware Defense: Tactics, Tools, and Systemic Strategies

This article dissects modern phishing and ransomware threats, detailing preparation, bait construction, email header spoofing, and open‑source tools like Gophish, then outlines comprehensive defensive measures—from endpoint security and threat intelligence to risk‑based response economics—offering a systematic, technology‑to‑tactics‑to‑strategy framework for information security teams.

Gophishinformation securityphishing
0 likes · 15 min read
Phishing & Ransomware Defense: Tactics, Tools, and Systemic Strategies
Architect's Guide
Architect's Guide
Jul 18, 2025 · Information Security

Why Permission Management Matters: Designing Effective RBAC Models

This article explains why strict permission management is essential for data security, outlines various permission models—from basic data‑view and edit rights to hierarchical RBAC, RBAC1, RBAC2, role inheritance, constraints, user groups, organizations and positions—and provides guidance on designing ideal database tables for robust access control.

RBACRole Inheritanceaccess control
0 likes · 18 min read
Why Permission Management Matters: Designing Effective RBAC Models
Su San Talks Tech
Su San Talks Tech
Jul 15, 2025 · Information Security

Master the 7 Most Essential Encryption Algorithms for Secure Systems

Explore the seven most commonly used encryption algorithms—including MD5, SHA families, HMAC, AES, DES/3DES, RSA, and DSA—detailing their principles, Java implementations, performance, and practical security guidelines, while highlighting real-world attack scenarios and best‑practice recommendations for robust information protection.

HashingJavaasymmetric encryption
0 likes · 9 min read
Master the 7 Most Essential Encryption Algorithms for Secure Systems
Java Captain
Java Captain
Jul 10, 2025 · Information Security

How a Young Developer Made 7 Million Yuan Selling Illegal Video‑Piracy Software

A 90‑born programmer created illegal video‑transfer software that bypassed watermark and originality checks on platforms like TikTok and Kuaishou, earning over 7 million yuan in less than a year before being sentenced to three years in prison, highlighting a criminal supply chain in China’s short‑video industry.

Chinacybercrimeinformation security
0 likes · 3 min read
How a Young Developer Made 7 Million Yuan Selling Illegal Video‑Piracy Software
Efficient Ops
Efficient Ops
Jul 8, 2025 · Information Security

How the SafePay Ransomware Crippled Ingram Micro’s Global Operations

On July 4, 2025, Ingram Micro, the world’s largest IT distributor, suffered a crippling ransomware attack by the SafePay group that stole nearly 1 TB of confidential data, encrypted critical systems, and forced a 48‑hour outage, highlighting severe risks for global supply‑chain operations.

CyberattackIngram MicroSafePay
0 likes · 3 min read
How the SafePay Ransomware Crippled Ingram Micro’s Global Operations
Java Captain
Java Captain
Jul 4, 2025 · Information Security

How to Use WeChat’s Hidden “Recover” Feature to Restore Lost Chats

This guide explains WeChat’s hidden “recover” function, its official purpose and limitations, step‑by‑step recovery methods via search or settings, practical tips, backup strategies, user‑tested success rates, and the risks of third‑party tools, helping users safeguard and restore chat data.

Chat BackupData RecoveryMobile Security
0 likes · 8 min read
How to Use WeChat’s Hidden “Recover” Feature to Restore Lost Chats
Top Architect
Top Architect
Jul 4, 2025 · Information Security

How to Secure JWT Tokens: Preventing Theft, Replay, and Forgery

With the rise of digital economies, token security—especially JWT—has become critical; this article compares token and traditional session authentication, outlines token-based authentication flow, identifies theft, replay, and forgery threats, and presents comprehensive safeguards such as HTTPS, encryption, secure storage, expiration policies, 2FA, and safe refresh mechanisms.

JWTinformation securitytoken security
0 likes · 14 min read
How to Secure JWT Tokens: Preventing Theft, Replay, and Forgery
IT Services Circle
IT Services Circle
Jul 3, 2025 · Information Security

When a Suspended IT Admin Turns Rogue: Inside a 7‑Month Prison Sentence

A disgruntled IT worker in the UK exploited his privileged accounts after being suspended, causing massive system outages across multiple countries, incurring over £200,000 in losses, and was sentenced to seven months in prison, highlighting critical insider‑threat risks for organizations.

IT admincyber sabotageinformation security
0 likes · 7 min read
When a Suspended IT Admin Turns Rogue: Inside a 7‑Month Prison Sentence
Alibaba Cloud Native
Alibaba Cloud Native
Jul 2, 2025 · Information Security

Tracing Malicious Attacks on Large Platforms with Alibaba Cloud SLS SQL

This article walks through a real‑world case where a large platform suffered a massive traffic‑based attack, showing how to extract high‑frequency IPs, join logs by trace_id, perform geographic analysis, and automate blacklist updates across Alibaba Cloud and AWS using SLS SQL and Python SDKs.

SLSSQLattack tracing
0 likes · 12 min read
Tracing Malicious Attacks on Large Platforms with Alibaba Cloud SLS SQL
Java Tech Enthusiast
Java Tech Enthusiast
Jun 26, 2025 · Information Security

Why Microsoft Office Users Saw TLS Certificate Errors and What It Means

A missed renewal of a TLS certificate for the domain https://support.content.office.net caused widespread certificate‑expired warnings for Office users on June 24, 2024, affecting all services that rely on several related domains and will likely be resolved once Microsoft updates the certificate during regular working hours.

Microsoft OfficeOperationsTLS
0 likes · 3 min read
Why Microsoft Office Users Saw TLS Certificate Errors and What It Means
IT Architects Alliance
IT Architects Alliance
Jun 25, 2025 · Information Security

Why Effective Permission Management Matters and How to Build Scalable RBAC Models

This article explains why strict permission management is essential for data security, outlines various permission models—including basic RBAC, role inheritance, and constrained RBAC—and provides practical guidance on designing tables, roles, groups, and organizational structures for scalable access control.

RBACRole Inheritanceaccess control
0 likes · 16 min read
Why Effective Permission Management Matters and How to Build Scalable RBAC Models
Java Tech Enthusiast
Java Tech Enthusiast
Jun 21, 2025 · Information Security

Why Your OneDrive Account Might Get Locked and How to Protect Your Data

A Reddit user’s Microsoft account was abruptly blocked, rendering decades of OneDrive‑stored photos and files inaccessible, which underscores the risks of relying on a single cloud backup and highlights the importance of multi‑point data protection strategies like the 3‑2‑1 rule.

3-2-1 ruleOneDriveaccount lock
0 likes · 4 min read
Why Your OneDrive Account Might Get Locked and How to Protect Your Data
Ops Community
Ops Community
Jun 18, 2025 · Information Security

How to Build Your Own Private CA on Linux with OpenSSL

Learn step-by-step how to set up a private Certificate Authority on Linux using OpenSSL, covering CA and PKI basics, directory structure, configuration files, generating root and client certificates, managing revocation lists, and essential commands for secure certificate management.

Certificate AuthorityLinuxOpenSSL
0 likes · 16 min read
How to Build Your Own Private CA on Linux with OpenSSL
AntTech
AntTech
Jun 16, 2025 · Information Security

Uncovering New Attack Vectors in Model Context Protocols: Risks and Defenses

A comprehensive study reveals that Model Context Protocol (MCP) platforms lack strict vetting, users struggle to detect malicious servers, and current large language models cannot effectively resist MCP‑level injection attacks, highlighting critical security challenges and proposing mitigation strategies.

LLM SecurityMCPinformation security
0 likes · 11 min read
Uncovering New Attack Vectors in Model Context Protocols: Risks and Defenses
Java Captain
Java Captain
Jun 8, 2025 · Mobile Development

Unlock WeChat’s Hidden ‘recover’ Feature to Restore Deleted Chats

This article explains WeChat’s hidden “recover” feature, detailing its official purpose, technical limits, step‑by‑step recovery methods, effectiveness, backup strategies, and the risks of third‑party tools, helping users safely restore lost chat records.

BackupData RecoveryMobile Development
0 likes · 8 min read
Unlock WeChat’s Hidden ‘recover’ Feature to Restore Deleted Chats
Efficient Ops
Efficient Ops
May 27, 2025 · Information Security

How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm

Guangzhou police investigated a foreign cyber‑attack on a local tech firm, traced the malicious code to a Taiwan‑based hacker group linked to the DPP, and detailed the group’s low‑level tactics, extensive asset scanning, and use of VPNs and overseas cloud servers.

Taiwan hacker groupcybersecurityhacker attribution
0 likes · 4 min read
How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm
Java Tech Enthusiast
Java Tech Enthusiast
May 22, 2025 · Information Security

Chrome’s Automatic Password Change Feature and Implementation Guidelines for Websites

Google Chrome now offers an automatic password‑change function that detects leaked credentials, generates strong passwords, and updates them with minimal user effort, while websites must adopt specific autocomplete attributes and change‑password URLs to integrate seamlessly with this security enhancement.

Auto-Password ChangeChromeinformation security
0 likes · 5 min read
Chrome’s Automatic Password Change Feature and Implementation Guidelines for Websites
Huolala Tech
Huolala Tech
May 20, 2025 · Information Security

How Huolala Built a Comprehensive Data Security Compliance Framework with AI

Huolala, a major internet freight platform, outlines its multi‑layered data security compliance system—covering national standards, industry regulations, organizational structures, technical safeguards, lifecycle management, incident response, audits, and AI‑driven maturity models—to ensure robust protection of personal and critical business data.

AIcloud computingdata security
0 likes · 11 min read
How Huolala Built a Comprehensive Data Security Compliance Framework with AI
Efficient Ops
Efficient Ops
May 20, 2025 · Information Security

How an Overseas Hacker Group Disrupted a Guangzhou Tech Company's Services

A coordinated overseas cyber‑attack breached a Guangzhou tech firm's self‑service equipment backend, causing hours of service outage, data leakage, and significant losses, prompting swift police investigation, evidence preservation, and a detailed technical analysis of the attackers' methods.

Chinacybersecurityhacker group
0 likes · 4 min read
How an Overseas Hacker Group Disrupted a Guangzhou Tech Company's Services
Su San Talks Tech
Su San Talks Tech
May 17, 2025 · Information Security

6 Practical Data Masking Techniques to Secure Sensitive Information

This article presents six widely used data masking solutions—from simple regex string replacement to advanced K‑anonymity—detailing their principles, Java implementations, pros and cons, performance impact, and suitable application scenarios, helping developers protect sensitive data in production and test environments.

data maskingencryptioninformation security
0 likes · 10 min read
6 Practical Data Masking Techniques to Secure Sensitive Information
Top Architect
Top Architect
May 7, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common security threats such as theft, replay and forgery, and provides practical mitigation measures including HTTPS, token encryption, secure storage, expiration policies, two‑factor authentication and safe token refresh mechanisms.

AuthenticationJWTWeb Development
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
Java Backend Technology
Java Backend Technology
Apr 30, 2025 · Information Security

When AI Becomes the Suspect: Dissecting a Crypto Theft and Code‑Poisoning Case

A crypto firm lost hundreds of thousands of USDT after a hard‑coded wallet address, allegedly inserted by an employee who blamed AI, prompting investigators to rule out AI misconduct and highlight human sabotage, while a separate ChatGPT‑generated code snippet secretly exfiltrated private keys, underscoring the emerging security risks of AI‑assisted programming.

AI riskAI securityBlockchain
0 likes · 4 min read
When AI Becomes the Suspect: Dissecting a Crypto Theft and Code‑Poisoning Case
macrozheng
macrozheng
Apr 29, 2025 · Information Security

Why Companies Ban IntelliJ IDEA: Legal, Security, and Cost Insights

The article explains why some companies prohibit IntelliJ IDEA, citing copyright risks, security vulnerabilities, efficiency losses from activation prompts, collaboration challenges, and the high cost of commercial licenses, while emphasizing the need to follow unified tool policies.

IntelliJ IDEAcompany policycost analysis
0 likes · 6 min read
Why Companies Ban IntelliJ IDEA: Legal, Security, and Cost Insights
Bilibili Tech
Bilibili Tech
Apr 25, 2025 · Information Security

How Bilibili Comics Leverages 3D Tracing, Anti‑Crawler, and Encrypted Channels to Fight Piracy

Bilibili Comics deploys a three‑layer protection system—stereoscopic tracing, crawler defense, and encrypted channels—that dramatically reduces illegal distribution, boosts creator engagement, and creates a healthier comic ecosystem through real‑time monitoring, automated takedowns, and secure CDN delivery.

BilibiliDigital Rights Managementanti‑crawler
0 likes · 6 min read
How Bilibili Comics Leverages 3D Tracing, Anti‑Crawler, and Encrypted Channels to Fight Piracy
Top Architect
Top Architect
Apr 21, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common token security threats such as theft, replay, and forgery, and presents practical mitigation measures including HTTPS, encryption, secure storage, short expiration, MFA, and safe token refresh mechanisms.

AuthenticationHTTPSJWT
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
Java Architect Essentials
Java Architect Essentials
Apr 20, 2025 · Information Security

Free PC Firewall Recommendations and Comparative Analysis

This article provides a comprehensive comparison of free PC firewall solutions, detailing each software's core functions, suitable scenarios, drawbacks, and source references, followed by key recommendations, compatibility notes, performance assessments, and user feedback to help readers choose the most suitable firewall.

PC securityWindowsfirewall
0 likes · 14 min read
Free PC Firewall Recommendations and Comparative Analysis
21CTO
21CTO
Apr 11, 2025 · Information Security

Oracle Cloud Breach: What Happened and Why OCI Claims No Impact

Oracle disclosed that attackers stole data from its legacy Cloud Classic servers, posted the breach on security forums, and claimed millions of records were compromised, while the company insists its Oracle Cloud Infrastructure was never breached, prompting widespread criticism and concern.

OCIOraclecloud security
0 likes · 5 min read
Oracle Cloud Breach: What Happened and Why OCI Claims No Impact
php Courses
php Courses
Apr 11, 2025 · Information Security

Best Practices for Securing PHP Files and Directories

This article explains the risks of exposing sensitive PHP files, outlines common security threats, and provides concrete best‑practice measures such as proper permission settings, .htaccess rules, placing files outside the web root, configuration safeguards, and regular security audits to protect web applications.

File PermissionsPHPSecurity
0 likes · 6 min read
Best Practices for Securing PHP Files and Directories
Open Source Linux
Open Source Linux
Apr 10, 2025 · Information Security

Explore Tscanplus: A Powerful All-in-One Network Security & Asset Management Tool

Tscanplus is a comprehensive network security and operations platform that quickly discovers and identifies assets, builds an asset database, and offers features such as port scanning, service detection, URL fingerprinting, POC validation, weak‑password guessing, encoding tools, privilege‑escalation aids, and more, with usage screenshots and a GitHub download link.

Tscanplusasset discoveryinformation security
0 likes · 2 min read
Explore Tscanplus: A Powerful All-in-One Network Security & Asset Management Tool
21CTO
21CTO
Apr 3, 2025 · Information Security

Why 56% of Open‑Source Packages Trigger Data Leaks – Sonatype’s Q1 2025 Malware Index

Sonatype’s Q1 2025 Open‑Source Malware Index identified 17,954 malicious packages—including hijacked npm crypto modules, a fake Truffle for VS Code extension, and counterfeit Solana packages—revealing that 56% of these components are associated with data breaches, a sharp rise from the 26% reported in Q4 2024, and highlighting the growing prevalence of complex, threat‑laden malware such as droppers and code‑injection threats.

data breachinformation securitymalware
0 likes · 2 min read
Why 56% of Open‑Source Packages Trigger Data Leaks – Sonatype’s Q1 2025 Malware Index
Open Source Linux
Open Source Linux
Apr 3, 2025 · Information Security

What Oracle’s Massive Cloud Data Breach Reveals About Cloud Security Risks

Oracle’s recent cloud security breach, allegedly exposing six million records from dozens of customers worldwide, has sparked FBI investigations, a class‑action lawsuit, and revelations about outdated middleware and evidence‑tampering, highlighting critical risks in cloud infrastructure and the need for stronger data protection.

Oracleclass action lawsuitcloud security
0 likes · 9 min read
What Oracle’s Massive Cloud Data Breach Reveals About Cloud Security Risks
AntTech
AntTech
Apr 2, 2025 · Information Security

ISO/IEC 25330-3 Standard on Oblivious Transfer Extension Approved, Led by Ant Group

The ISO/IEC JTC 1/SC 27 plenary meeting in Virginia approved the ISO/IEC 25330 Part 3 standard on Oblivious Transfer Extension, a cryptographic protocol standardized by Ant Group with contributions from Chinese researchers, aiming to improve OT efficiency and interoperability for secure multi‑party computation.

Ant GroupISO/IEC 25330Oblivious Transfer
0 likes · 4 min read
ISO/IEC 25330-3 Standard on Oblivious Transfer Extension Approved, Led by Ant Group
IT Architects Alliance
IT Architects Alliance
Mar 29, 2025 · Information Security

Database Data Masking Techniques: SQL, Java, and MyBatis-Mate Sensitive-Jackson Comparison

The article explains why data masking is essential for protecting sensitive information, then details three implementation methods—SQL, Java (with open‑source plugins), and the MyBatis‑Mate‑Sensitive‑Jackson ORM extension—comparing their principles, code examples, advantages, limitations, performance, suitable scenarios, and cost considerations.

JavaMyBatisSQL
0 likes · 17 min read
Database Data Masking Techniques: SQL, Java, and MyBatis-Mate Sensitive-Jackson Comparison
Python Programming Learning Circle
Python Programming Learning Circle
Mar 27, 2025 · Information Security

Decrypting Password‑Protected Zip Files with Python

This article explains how to use Python's built‑in zipfile module and the third‑party rarfile library to brute‑force and decrypt encrypted zip archives, handle Chinese filename encoding issues, and generate password permutations efficiently with itertools for flexible password lengths.

Pythonfile decryptioninformation security
0 likes · 9 min read
Decrypting Password‑Protected Zip Files with Python
php Courses
php Courses
Mar 25, 2025 · Information Security

Using captainhook/secrets with Composer to Detect and Prevent Sensitive Information Leakage

This article explains how to automatically detect and block accidental commits of sensitive data such as database passwords or API keys in a PHP project by integrating the captainhook/secrets library via Composer, covering installation, predefined suppliers, custom regex, whitelist usage, and the benefits of CI/CD integration.

ComposerPHPci/cd
0 likes · 4 min read
Using captainhook/secrets with Composer to Detect and Prevent Sensitive Information Leakage
IT Architects Alliance
IT Architects Alliance
Mar 23, 2025 · Information Security

Cloud Architecture Security: Overlooked Hidden Vulnerabilities and Mitigation Strategies

The article examines the often‑ignored hidden vulnerabilities in cloud architectures—such as API flaws, misconfigurations, and third‑party service risks—illustrates real‑world incidents, explains why enterprises neglect these issues, and offers concrete measures to strengthen cloud security.

API vulnerabilitiescloud securityinformation security
0 likes · 10 min read
Cloud Architecture Security: Overlooked Hidden Vulnerabilities and Mitigation Strategies
Cognitive Technology Team
Cognitive Technology Team
Mar 22, 2025 · Information Security

Cryptographic Watermarking for Generative AI: Techniques, Challenges, and Recent Advances

The article examines how cryptographic watermarking can secure AI‑generated content by embedding robust, undetectable, and unforgeable signatures, reviews existing methods such as SynthID and Video Seal, and discusses recent research using pseudo‑random codes, error‑correcting codes, and diffusion inversion to improve watermark resilience.

AI watermarkingLDPCcryptography
0 likes · 9 min read
Cryptographic Watermarking for Generative AI: Techniques, Challenges, and Recent Advances
Raymond Ops
Raymond Ops
Mar 18, 2025 · Information Security

Master OpenSSL: From Symmetric Encryption to Digital Certificates

This comprehensive guide explains OpenSSL’s role in cryptography, covering symmetric and asymmetric encryption, hashing, key generation, certificate creation, and practical command‑line examples for encrypting files, managing keys, signing data, and configuring TLS servers, empowering readers to master secure communications.

OpenSSLcommand-linecryptography
0 likes · 24 min read
Master OpenSSL: From Symmetric Encryption to Digital Certificates
Selected Java Interview Questions
Selected Java Interview Questions
Mar 16, 2025 · Information Security

Integrating Apache Tika with Spring Boot for Sensitive Information Detection and Data Leakage Prevention

This article explains Apache Tika's core features, architecture, and multiple application scenarios, then provides a step‑by‑step guide to embed Tika in a Spring Boot project to extract file content, detect personal data such as ID numbers, credit cards and phone numbers using regular expressions, and protect against data leakage.

Apache TikaSensitive Data DetectionSpring Boot
0 likes · 23 min read
Integrating Apache Tika with Spring Boot for Sensitive Information Detection and Data Leakage Prevention
Architecture and Beyond
Architecture and Beyond
Mar 15, 2025 · Information Security

Prompt Injection Attacks on Large Language Models: Risks, Types, and Defense Framework

This article explains how prompt injection attacks exploit large language models by altering their behavior through crafted inputs, outlines the major harms and attack categories—including direct, indirect, multimodal, code, and jailbreak attacks—and presents a comprehensive three‑layer defense framework covering input‑side, output‑side, and system‑level protections.

AI SafetyLLM Securityinformation security
0 likes · 16 min read
Prompt Injection Attacks on Large Language Models: Risks, Types, and Defense Framework
21CTO
21CTO
Mar 10, 2025 · Information Security

Malicious Ads Hijack GitHub and Phone‑Cleaning Apps Leak Your Data

Microsoft uncovered a malicious ad campaign that used pirated streaming sites and multi‑layer redirects to deliver GitHub‑hosted malware, while a separate Surfshark report revealed popular phone‑cleaning apps secretly sharing extensive user data with hundreds of third‑party partners.

Ad FraudGitHubdata leakage
0 likes · 4 min read
Malicious Ads Hijack GitHub and Phone‑Cleaning Apps Leak Your Data
Efficient Ops
Efficient Ops
Feb 20, 2025 · Information Security

How a Maintenance Staff Leak Exposed Security Gaps and How to Prevent It

A recent case where a maintenance worker exploited device‑management flaws to steal confidential files for foreign spies highlights the need for heightened vigilance, strict self‑discipline, and prompt reporting, offering practical steps to safeguard against similar security breaches.

data leakageincident responseinformation security
0 likes · 4 min read
How a Maintenance Staff Leak Exposed Security Gaps and How to Prevent It
Top Architecture Tech Stack
Top Architecture Tech Stack
Feb 12, 2025 · Information Security

Hackers Deface Wuhan State-Owned Company's Website Over Unpaid Salaries: Legal and Social Implications

On February 8, 2025, the homepage of Wuhan Huike Zhichuang Technology Co., a state‑owned enterprise, was hijacked with a bold protest message about unpaid programmer wages, sparking legal analysis, public debate on labor rights, and concerns over information‑security vulnerabilities in Chinese state firms.

Chinese lawinformation securitylabor rights
0 likes · 5 min read
Hackers Deface Wuhan State-Owned Company's Website Over Unpaid Salaries: Legal and Social Implications
DataFunSummit
DataFunSummit
Feb 11, 2025 · Information Security

War‑Like Strategies for URL Anti‑Fraud: Threat Analysis, Detection Techniques, and Operational Intelligence

The article examines the growing threat of black‑market malicious websites, outlines a five‑part war‑themed framework for comprehensive opponent analysis, detection strategies across traffic, channel, content and relationship dimensions, and advanced detection models—including fingerprint, text, image, graph, and multimodal approaches—while highlighting the supporting operational and intelligence systems.

fraud detectioninformation securitymachine learning
0 likes · 14 min read
War‑Like Strategies for URL Anti‑Fraud: Threat Analysis, Detection Techniques, and Operational Intelligence
Java Web Project
Java Web Project
Feb 11, 2025 · Information Security

How to Use Apache Tika in Spring Boot for Automatic Sensitive Data Detection

This article explains Apache Tika’s core features and architecture, outlines common use‑cases, and provides a step‑by‑step Spring Boot tutorial—including Maven/Gradle setup, a service that extracts text with Tika, regex‑based sensitive‑info detection, a REST controller, optional front‑end, testing instructions, expected output, and extension ideas.

Apache TikaContent ExtractionJava
0 likes · 24 min read
How to Use Apache Tika in Spring Boot for Automatic Sensitive Data Detection
Su San Talks Tech
Su San Talks Tech
Jan 19, 2025 · Information Security

How Data Masking Protects Sensitive Information: Techniques and Best Practices

This article explains data masking techniques—including static (SDM) and dynamic (DDM) methods—detailing how to protect sensitive fields like phone numbers and IDs through replacement, truncation, encryption, randomization, and other schemes, while preserving data utility for testing and analysis.

Dynamic Maskingdata anonymizationdata masking
0 likes · 8 min read
How Data Masking Protects Sensitive Information: Techniques and Best Practices
Tencent Cloud Developer
Tencent Cloud Developer
Jan 9, 2025 · Information Security

Why You Can’t Hack WeChat Balance: 5 Layers of Financial Safeguards

The article breaks down five technical defenses—database storage, transaction logs, double‑entry checks, account‑aging monitoring, and external reconciliation—that prevent anyone from arbitrarily changing a WeChat user's balance, illustrating why such tampering is practically impossible.

WeChataccounting controlsbalance manipulation
0 likes · 6 min read
Why You Can’t Hack WeChat Balance: 5 Layers of Financial Safeguards
Raymond Ops
Raymond Ops
Jan 4, 2025 · Information Security

Understanding SSL Mutual Authentication vs One‑Way: When and Why to Use It

SSL/TLS certificates secure data between browsers and servers, but while one‑way authentication verifies only the server, mutual (two‑way) authentication also validates the client using personal authentication certificates, requiring additional keys and CA roots, making it ideal for high‑security enterprise environments.

SSLTLSinformation security
0 likes · 8 min read
Understanding SSL Mutual Authentication vs One‑Way: When and Why to Use It
Data Thinking Notes
Data Thinking Notes
Dec 29, 2024 · Information Security

A Complete Blueprint for Enterprise Digital Transformation Architecture

This article presents a comprehensive visual guide to enterprise digital transformation, covering overall digital planning, application system architecture, data architecture, information security architecture, and digital organization and governance, illustrating each layer with detailed diagrams to aid strategic implementation.

Data ArchitectureDigital Transformationenterprise architecture
0 likes · 5 min read
A Complete Blueprint for Enterprise Digital Transformation Architecture
Xiaohongshu Tech REDtech
Xiaohongshu Tech REDtech
Dec 25, 2024 · Industry Insights

How Xiaohongshu’s Security Team Achieved Zero Defense Losses in Shanghai’s 2024 “Panshi Action”

In December 2024, Xiaohongshu’s information security team topped the Shanghai “Panshi Action” competition, earning top blue‑team honors and a zero‑loss defense record by leveraging real‑time traffic monitoring, big‑data analytics, rapid incident response, and successful attacker attribution.

big data analysiscybersecurityincident response
0 likes · 3 min read
How Xiaohongshu’s Security Team Achieved Zero Defense Losses in Shanghai’s 2024 “Panshi Action”
Java Architect Essentials
Java Architect Essentials
Dec 24, 2024 · Information Security

Techniques for Performing Fuzzy Queries on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and presents three categories of solutions—naïve in‑memory decryption, conventional database‑level approaches, and advanced algorithmic methods—evaluating their implementation steps, security implications, and performance trade‑offs.

algorithmencryptionfuzzy-search
0 likes · 11 min read
Techniques for Performing Fuzzy Queries on Encrypted Data
Java Architect Essentials
Java Architect Essentials
Dec 24, 2024 · Information Security

Beijing Chaoyang Court Rules Unfair Competition in Navigation Data Scraping, Awards 12.5 Million Yuan Compensation

The Chaoyang District People's Court in Beijing found that a technology company illegally scraped the "congestion delay index" from a navigation map, used it for commercial purposes, and ordered it to stop the infringement and pay a total of 12.5 million yuan in damages, highlighting the legal protection of competitive data rights.

Chinadata-scrapinginformation security
0 likes · 5 min read
Beijing Chaoyang Court Rules Unfair Competition in Navigation Data Scraping, Awards 12.5 Million Yuan Compensation
Radish, Keep Going!
Radish, Keep Going!
Dec 19, 2024 · Information Security

Why “Security Is Our Top Priority” Is Empty Talk—and How to Balance Security with UX

The article critiques hollow security‑first slogans, explores the endless nature of security, the tension between security and user experience, and offers practical risk‑scoring frameworks and phrasing advice for organizations seeking a realistic balance between protection and usability.

SecurityUser experienceinformation security
0 likes · 10 min read
Why “Security Is Our Top Priority” Is Empty Talk—and How to Balance Security with UX
AntTech
AntTech
Dec 6, 2024 · Information Security

Ant Financial's MorseCrypto Wins First Place in the 2024 Financial Cipher Cup Second Stage with High‑Performance SM2/SM3/SM4 Implementations

Ant Financial's MorseCrypto team secured first place in the 2024 Financial Cipher Cup second‑stage competition by delivering highly optimized SM2, SM3, and SM4 implementations on X86 and ARM platforms that achieve up to 4.3‑times faster verification while meeting strict security and memory constraints.

AssemblyPerformance OptimizationSM2
0 likes · 4 min read
Ant Financial's MorseCrypto Wins First Place in the 2024 Financial Cipher Cup Second Stage with High‑Performance SM2/SM3/SM4 Implementations
DevOps
DevOps
Nov 26, 2024 · Information Security

10 Best‑Practice Principles for Implementing a Secure Development Lifecycle (SDL)

This article outlines ten essential best‑practice principles for implementing a Secure Development Lifecycle (SDL), covering top‑down leadership, alignment with existing management systems, visualizable processes, security goal classification, componentized security capabilities, supply‑chain management, service‑oriented SDL, DevSecOps toolchains, continuous optimization, and staff training.

DevSecOpsSDLSecure Development
0 likes · 17 min read
10 Best‑Practice Principles for Implementing a Secure Development Lifecycle (SDL)
Efficient Ops
Efficient Ops
Nov 26, 2024 · Information Security

When Ops Go Wrong: Real Database Deletion Cases and Their Legal Fallout

This article reviews several high‑profile incidents where operations staff deleted or sabotaged critical databases, detailing the legal consequences, financial losses, and lessons for improving security and operational safeguards.

Database Securitydata loss preventioninformation security
0 likes · 7 min read
When Ops Go Wrong: Real Database Deletion Cases and Their Legal Fallout
Open Source Linux
Open Source Linux
Nov 26, 2024 · Information Security

New “Silver Fox” Trojan Targets Chinese Users – How It Spreads and How to Defend

A recent advisory from China’s National Computer Virus Emergency Response Center reveals a new “Silver Fox” Trojan variant distributed via phishing pages and social‑media links, explains its infection process on Windows PCs, and outlines practical prevention steps for enterprises and individual users.

Silver Fox Trojancyber threatinformation security
0 likes · 5 min read
New “Silver Fox” Trojan Targets Chinese Users – How It Spreads and How to Defend