Tagged articles
981 articles
Page 4 of 10
Java Architect Essentials
Java Architect Essentials
Mar 3, 2024 · Information Security

How to Secure Login APIs: Defending Against Brute Force, MITM, and More

This article examines common login vulnerabilities such as brute‑force attacks, CAPTCHA bypass, IP‑based lockouts, and man‑in‑the‑middle threats, and provides practical mitigation techniques—including password‑retry limits, CAPTCHA, SMS verification, HTTPS enforcement, and logging—to harden web authentication systems.

CaptchaHTTPSIP blocking
0 likes · 11 min read
How to Secure Login APIs: Defending Against Brute Force, MITM, and More
Java Tech Enthusiast
Java Tech Enthusiast
Jan 21, 2024 · Information Security

Security Risks of Exposing Your Public IP Address

Exposing your public IP address can invite DDoS floods, vulnerability scanning, privacy breaches, and targeted phishing or malware attacks, so you should protect it with firewalls, regular updates, secure VPN connections, and by avoiding public disclosure on social platforms.

DDoSPublic IPfirewall
0 likes · 3 min read
Security Risks of Exposing Your Public IP Address
AntTech
AntTech
Jan 18, 2024 · Information Security

The Value of Security Technology in the Digital Age – Summary of Lü Peng’s Report Presentation

The report released by the Chinese Academy of Social Sciences and Ant Group highlights how security technology, now a public good alongside AI, is essential for managing accelerating digital risks, outlines its four pillars, and proposes collaborative strategies to make security technology a universal, socially responsible foundation for the digital society.

AI riskdigital societyinformation security
0 likes · 14 min read
The Value of Security Technology in the Digital Age – Summary of Lü Peng’s Report Presentation
Efficient Ops
Efficient Ops
Jan 8, 2024 · Information Security

How a Securities Firm Built a 100‑Day DevSecOps Prototype

At the 21st GOPS Global Operations Conference in Shanghai, Shenwan Hongyuan Securities' application security lead Wang Biansi detailed a step‑by‑step 100‑day journey to create a DevSecOps sample room, covering goal setting, research, platform design, tool integration, and security training.

Application SecurityDevSecOpsOperations
0 likes · 5 min read
How a Securities Firm Built a 100‑Day DevSecOps Prototype
21CTO
21CTO
Jan 8, 2024 · Information Security

How Lei Jun’s 1992 Expert System Pioneered Virus Detection – A Forgotten AI Breakthrough

During his 2023 'Growth' speech, Lei Jun recalled his 1992 university paper on a computer virus detection expert system—once a pioneering AI approach published in *Computer Research and Development*—which resurfaced online after 30 years, sparking admiration for its forward‑thinking security insights.

Lei Juncomputer scienceexpert system
0 likes · 3 min read
How Lei Jun’s 1992 Expert System Pioneered Virus Detection – A Forgotten AI Breakthrough
21CTO
21CTO
Jan 7, 2024 · Fundamentals

What Will Shape Software Development in 2024? Key Trends to Watch

The 2024 software development landscape will be driven by AI and machine‑learning integration, blockchain expansion, multi‑runtime microservices, heightened security, AR/VR adoption, sustainable coding, serverless, edge and quantum computing, as well as evolving programming languages and low‑code platforms.

2024 trendsBlockchainai
0 likes · 16 min read
What Will Shape Software Development in 2024? Key Trends to Watch
OPPO Amber Lab
OPPO Amber Lab
Dec 27, 2023 · Information Security

How OPPO Secures Global Smart Devices with BSIMM‑Driven Compliance

At the 7th Cloud Security Alliance Greater China Conference, OPPO’s security chief outlined the challenges of global smart‑device compliance and shared a BSIMM‑based framework for building robust enterprise security systems that bridge legal, technical, and operational hurdles.

BSIMMOPPOglobal delivery
0 likes · 4 min read
How OPPO Secures Global Smart Devices with BSIMM‑Driven Compliance
php Courses
php Courses
Dec 26, 2023 · Information Security

Preventing Cross-Site Scripting (XSS) in PHP Using Data Filtering

This article explains the principles of XSS attacks and demonstrates how to prevent them in PHP by using htmlspecialchars for output escaping, mysqli or PDO prepared statements for database queries, and the filter_var function with appropriate filters, providing clear code examples for each method.

Data FilteringPHPPrepared Statements
0 likes · 5 min read
Preventing Cross-Site Scripting (XSS) in PHP Using Data Filtering
Liangxu Linux
Liangxu Linux
Dec 23, 2023 · Information Security

How HTTPS Secures Your Data: A Beginner’s Guide to Encryption, Integrity, and Trust

This article explains why HTTPS is needed, defines the protocol, describes the four security properties—confidentiality, integrity, authentication, and non‑repudiation—covers symmetric and asymmetric encryption, hybrid encryption, hash functions, digital signatures, certificate authorities, and the trust chain that together protect web communications.

Certificate AuthorityHTTPSTLS
0 likes · 15 min read
How HTTPS Secures Your Data: A Beginner’s Guide to Encryption, Integrity, and Trust
Alibaba Cloud Native
Alibaba Cloud Native
Dec 22, 2023 · Cloud Native

Secure Sensitive Configurations in MSE Nacos Using KMS Encryption

This guide explains how MSE Nacos integrates with Alibaba Cloud KMS to encrypt and protect sensitive configuration data, covering the security challenges, architecture, encryption/decryption workflows, recommended configuration items, step‑by‑step setup, and Java/Go SDK examples for cloud‑native applications.

Configuration EncryptionKMSMSE Nacos
0 likes · 16 min read
Secure Sensitive Configurations in MSE Nacos Using KMS Encryption
Efficient Ops
Efficient Ops
Dec 17, 2023 · Information Security

How China Postal Savings Bank Achieved Advanced DevSecOps Standards

China Postal Savings Bank’s software R&D center detailed how its Gold‑Metal Cloud Mall project passed the CAICT DevSecOps Level‑2 assessment, showcasing a comprehensive cultural, process and technical rollout that boosted security metrics, cross‑team collaboration, and positioned the bank at the forefront of digital transformation.

DevSecOpsDigital Transformationcase study
0 likes · 17 min read
How China Postal Savings Bank Achieved Advanced DevSecOps Standards
Open Source Linux
Open Source Linux
Dec 15, 2023 · Information Security

Understanding Ransomware: Types, Attack Methods, and Effective Defenses

This article explains what ransomware is, outlines its main variants such as encryption‑based, lock‑screen and doxware ransomware, describes common infection vectors like brute‑force, phishing and exploit kits, and provides practical network‑ and host‑side defenses as well as response steps if an attack occurs.

cybercrimedefenseencryption
0 likes · 9 min read
Understanding Ransomware: Types, Attack Methods, and Effective Defenses
Open Source Linux
Open Source Linux
Dec 11, 2023 · Information Security

Stealing Keys from Air‑Gapped PCs via Electromagnetic Eavesdropping

Researchers demonstrate a $3,000 electromagnetic detector that can capture encryption keys and other sensitive data from computers that are not connected to any network, revealing a fast, non‑intrusive side‑channel attack that bypasses traditional security measures.

Hardware HackingSide-channel attackair‑gapped security
0 likes · 5 min read
Stealing Keys from Air‑Gapped PCs via Electromagnetic Eavesdropping
php Courses
php Courses
Dec 8, 2023 · Information Security

Critical Bluetooth Vulnerability CVE-2023-45866 Affects Android, iOS, Linux, and macOS

A high‑severity Bluetooth vulnerability (CVE‑2023‑45866) discovered by SkySafe researcher Marc Newlin allows attackers to bypass authentication, pair a fake keyboard, and execute code on Android, iOS, Linux, and macOS devices, with Google’s December Android security update already addressing the issue.

AndroidBluetoothCVE-2023-45866
0 likes · 2 min read
Critical Bluetooth Vulnerability CVE-2023-45866 Affects Android, iOS, Linux, and macOS
Code Ape Tech Column
Code Ape Tech Column
Dec 7, 2023 · Information Security

Implementing Symmetric and Asymmetric Encryption, Digital Signatures, and Dynamic URL Encryption in Spring Cloud Gateway

This article explains the principles of symmetric and asymmetric encryption, digital signatures, HTTPS with CA, and demonstrates how to generate RSA keys, handle symmetric keys, encrypt URLs with AES, and verify signatures using custom Spring Cloud Gateway filters, complete with Java code examples.

digital signatureencryptioninformation security
0 likes · 24 min read
Implementing Symmetric and Asymmetric Encryption, Digital Signatures, and Dynamic URL Encryption in Spring Cloud Gateway
DataFunSummit
DataFunSummit
Nov 23, 2023 · Information Security

How DCMM Supports Digital Transformation and Data Governance at XCMG Mining Machinery Co., Ltd.

This article details how XCMG Mining Machinery leveraged the DCMM framework to drive digital transformation, improve data governance, address data quality and security challenges, and establish a sustainable data-driven culture across the organization, highlighting the background, implementation steps, lessons learned, and future outlook.

DCMMData QualityDigital Transformation
0 likes · 25 min read
How DCMM Supports Digital Transformation and Data Governance at XCMG Mining Machinery Co., Ltd.
Architects' Tech Alliance
Architects' Tech Alliance
Nov 9, 2023 · Fundamentals

China Xinchuang (Information Technology Innovation) Industry Report 2023: Development History, Market Size, and Investment Opportunities

The 2023 China Xinchuang industry report analyzes the sector's evolution, policy environment, market scale, value chain, cost structure, and investment opportunities across hardware, operating systems, middleware, databases, cloud computing, and information security, highlighting a projected market size of 8 trillion CNY by 2025.

ChinaIT industryXinchuang
0 likes · 20 min read
China Xinchuang (Information Technology Innovation) Industry Report 2023: Development History, Market Size, and Investment Opportunities
AntTech
AntTech
Nov 4, 2023 · Information Security

Native Security Paradigm and Parallel Security Aspects for Enterprise Digital Transformation

The whitepaper examines how exploding complexity in digitally transformed enterprises demands a native security paradigm and parallel security aspects that embed distributed, real‑time, and tool‑driven protection into system design, enabling high integration and low coupling between security and business functions.

Digital TransformationEnterpriseinformation security
0 likes · 11 min read
Native Security Paradigm and Parallel Security Aspects for Enterprise Digital Transformation
Architects Research Society
Architects Research Society
Nov 1, 2023 · Information Security

Roles and Responsibilities of a Security Architecture Team

The article outlines the composition and responsibilities of a security architecture team, detailing the roles of Security Architect, Information Security Architect, CISO, and Security Analyst, their required business and technical skills, risk management, threat modeling, and how they integrate with enterprise architecture.

CISOSecurity ArchitectureSecurity Roles
0 likes · 11 min read
Roles and Responsibilities of a Security Architecture Team
Data Thinking Notes
Data Thinking Notes
Oct 31, 2023 · Information Security

Why Data Classification & Grading Is Critical for Enterprise Security

This article explains the legal and strategic importance of data classification and grading in China, outlines the relevant regulations, describes the principles and processes for implementing classification, and offers practical steps for enterprises to secure data while meeting compliance and business needs.

Data GovernanceEnterprise Compliancedata classification
0 likes · 11 min read
Why Data Classification & Grading Is Critical for Enterprise Security
Laravel Tech Community
Laravel Tech Community
Oct 29, 2023 · Information Security

Remote Code Execution Vulnerability in Apache ActiveMQ < 5.18.3 (Deserialization)

Apache ActiveMQ versions prior to 5.18.3 are vulnerable to a deserialization flaw that allows remote code execution via crafted OpenWire messages on port 61616, affecting various activemq-client and activemq-openwire-legacy artifacts, and can be mitigated by upgrading to 5.15.16, 5.16.7, 5.17.6, 5.18.3 or later.

Apache ActiveMQDeserializationMessaging Middleware
0 likes · 3 min read
Remote Code Execution Vulnerability in Apache ActiveMQ < 5.18.3 (Deserialization)
php Courses
php Courses
Oct 24, 2023 · Information Security

Using PHP Encryption Functions for Data Protection

This article explains PHP's built‑in encryption functions—including OpenSSL encryption/decryption, hashing, and password handling—shows how to generate keys, encrypt and decrypt data, and provides best‑practice tips for securely protecting sensitive information in PHP applications.

Data ProtectionOpenSSLencryption
0 likes · 5 min read
Using PHP Encryption Functions for Data Protection
AntTech
AntTech
Oct 20, 2023 · Information Security

Digital Accessible Online Movie Service for the Visually Impaired: Privacy Computing, Blockchain, and Secure Identity Verification

The article describes how Ant Group and partners created an accessible online movie platform for visually impaired users in China, employing innovative privacy‑computing, blockchain, and terminal‑security technologies to enable secure, minimal‑disclosure identity verification and protect intellectual‑property rights.

Identity verificationPrivacy Computingaccessible media
0 likes · 6 min read
Digital Accessible Online Movie Service for the Visually Impaired: Privacy Computing, Blockchain, and Secure Identity Verification
Java Architect Essentials
Java Architect Essentials
Oct 13, 2023 · Information Security

Understanding JWT Claims and Token Renewal Strategies

This article explains the structure of JWT payloads, enumerates standard and custom claims, demonstrates how to generate tokens with expiration using Java code, and compares single‑token and double‑token renewal schemes—including Redis storage and WeChat OAuth2.0 examples—to help developers manage authentication securely.

backend-developmentinformation securitytoken refresh
0 likes · 7 min read
Understanding JWT Claims and Token Renewal Strategies
MaGe Linux Operations
MaGe Linux Operations
Oct 12, 2023 · Information Security

How to Detect and Bypass CDN to Reveal a Website’s Real IP

This guide explains why CDNs hide a site's true IP, how to determine if a website uses a CDN, and outlines practical techniques—including DNS queries, online tools, sub‑domain analysis, email reverse lookup, and scanning scripts—to bypass the CDN and discover the real server address.

CDNIP discoveryNetwork Reconnaissance
0 likes · 8 min read
How to Detect and Bypass CDN to Reveal a Website’s Real IP
Open Source Linux
Open Source Linux
Sep 27, 2023 · Information Security

How Companies Spy on Your WeChat Chats and How to Defend Your Privacy

Despite modern privacy expectations, many companies in 2023 still monitor employees' chat records using root‑level management software and network interception, exposing personal WeChat conversations; this article explains the surveillance methods, real‑world examples, and practical steps employees can take to protect their privacy.

WeChatcompany policiesdesktop surveillance
0 likes · 5 min read
How Companies Spy on Your WeChat Chats and How to Defend Your Privacy
Data Thinking Notes
Data Thinking Notes
Sep 24, 2023 · Information Security

How to Build a Robust Data Security Governance Framework: Steps & Best Practices

Data security governance, essential for modern enterprises, involves classifying and authorizing data, implementing scenario-based protections, and establishing comprehensive frameworks that address compliance, asset management, process control, and continuous improvement, guiding organizations through strategic planning, organizational structuring, policy creation, and ongoing operational monitoring.

Frameworkcompliancedata security
0 likes · 15 min read
How to Build a Robust Data Security Governance Framework: Steps & Best Practices
MaGe Linux Operations
MaGe Linux Operations
Sep 12, 2023 · Information Security

Mastering Container Vulnerability Management: Secure DevOps Strategies

This article explains how containers work, outlines the challenges of detecting and fixing vulnerabilities throughout the software lifecycle, and presents practical strategies—including CI/CD pipeline, registry, runtime, and host scanning—plus key principles for building a robust container security program.

Container SecurityDevOpsVulnerability Management
0 likes · 7 min read
Mastering Container Vulnerability Management: Secure DevOps Strategies
AntTech
AntTech
Sep 12, 2023 · Artificial Intelligence

Ensuring Trustworthy and Secure AI: Insights from the 2023 Pujiang Innovation Forum

The 2023 Pujiang Innovation Forum highlighted the rapid rise of generative AI, its associated security and privacy risks, and presented Ant Group's multi‑stage, multi‑layered approach—including data, training, and inference controls and three core defense technologies—to achieve safe, reliable, and open knowledge sharing in the era of large language models.

Large Language Modelsinformation securityknowledge sharing
0 likes · 10 min read
Ensuring Trustworthy and Secure AI: Insights from the 2023 Pujiang Innovation Forum
IT Services Circle
IT Services Circle
Sep 8, 2023 · Information Security

High‑Severity Vulnerabilities Discovered in Notepad++ (CVE‑2023‑40031, CVE‑2023‑40036, CVE‑2023‑40164, CVE‑2023‑40166)

Security researchers have identified four high‑severity buffer‑overflow vulnerabilities (CVE‑2023‑40031, CVE‑2023‑40036, CVE‑2023‑40164, CVE‑2023‑40166) in the popular open‑source editor Notepad++, disclosed after the developers failed to patch them before the release of version 8.5.6, urging users to apply mitigations.

CVENotepad++information security
0 likes · 3 min read
High‑Severity Vulnerabilities Discovered in Notepad++ (CVE‑2023‑40031, CVE‑2023‑40036, CVE‑2023‑40164, CVE‑2023‑40166)
Architect
Architect
Sep 4, 2023 · Information Security

Design and Implementation of a Unified Permission Management Service (MPS)

This article details the design and development of a unified permission management service (MPS) that consolidates RBAC, ACL, and DAC models to solve fragmented enterprise permission issues, covering requirement analysis, technical selection, functional modules, deployment, and performance outcomes.

ACLDACGo
0 likes · 16 min read
Design and Implementation of a Unified Permission Management Service (MPS)
Liangxu Linux
Liangxu Linux
Aug 22, 2023 · Information Security

Explore siusiu: A Docker‑Based Penetration Testing Toolbox with Over 50 Ready‑to‑Use Security Tools

siusiu is a Docker‑based penetration testing toolbox that bundles more than 50 security utilities, offers an interactive console for listing, downloading, and running tools, supports non‑interactive mode, and can be installed via binary, Git, or Go with detailed usage commands.

Dockerinformation securitypenetration testing
0 likes · 5 min read
Explore siusiu: A Docker‑Based Penetration Testing Toolbox with Over 50 Ready‑to‑Use Security Tools
MaGe Linux Operations
MaGe Linux Operations
Aug 17, 2023 · Information Security

Explore siusiu: A Docker‑Powered Penetration Testing Toolbox

siusiu is a Docker‑based penetration testing toolbox that bundles dozens of security utilities as Docker images, offering an easy‑to‑use console, multiple installation methods, and a rich command set for both interactive and scripted security assessments.

DevOpsDockerinformation security
0 likes · 6 min read
Explore siusiu: A Docker‑Powered Penetration Testing Toolbox
21CTO
21CTO
Aug 15, 2023 · Information Security

Can Your Keyboard’s Sound Leak Your Password? AI‑Powered Acoustic Eavesdropping

A recent UK study demonstrates that a deep‑learning model can analyze audio recordings of keystrokes—captured via microphones or video‑call platforms like Zoom—to infer typed characters with up to 95 % accuracy, highlighting a serious acoustic side‑channel threat to passwords and other sensitive information.

acoustic side-channelaudio eavesdroppinginformation security
0 likes · 4 min read
Can Your Keyboard’s Sound Leak Your Password? AI‑Powered Acoustic Eavesdropping
AntTech
AntTech
Aug 15, 2023 · Information Security

VILLAIN: Backdoor Attacks Against Vertical Split Learning Presented at USENIX Security 2023

The paper "VILLAIN: Backdoor Attacks Against Vertical Split Learning" introduced at USENIX Security 2023 proposes a novel framework that enables label‑free attackers to infer data labels and inject backdoors into vertically partitioned federated learning models, highlighting new security challenges and defense considerations for collaborative AI systems.

Federated LearningUSENIX Securitybackdoor attack
0 likes · 4 min read
VILLAIN: Backdoor Attacks Against Vertical Split Learning Presented at USENIX Security 2023
Huolala Tech
Huolala Tech
Aug 15, 2023 · Information Security

How Modern Security Risk Assessment Evolved: Key Features and Practical Insights

This article examines the expanded scope, updated standards, and practical workflow of security risk assessment in today's regulatory environment, offering detailed guidance on assessment criteria, target objects, methodologies, organizational steps, and decision‑making for effective risk management.

Data Protectioncomplianceinformation security
0 likes · 9 min read
How Modern Security Risk Assessment Evolved: Key Features and Practical Insights
MaGe Linux Operations
MaGe Linux Operations
Jul 28, 2023 · Information Security

What Made Wireshark Thrive for 25 Years? Key Lessons from Its History

Celebrating Wireshark's 25‑year journey, this article recounts its origin as Ethereal, the community‑driven growth, pivotal milestones, and the essential support structures that turned a simple open‑source packet analyzer into a cornerstone tool for network reliability, education, and security worldwide.

Wiresharkinformation securitynetwork analysis
0 likes · 5 min read
What Made Wireshark Thrive for 25 Years? Key Lessons from Its History
AntTech
AntTech
Jul 26, 2023 · Information Security

Ant Group and Nanyang Technological University Launch Collaboration on Private Set Intersection Privacy Computing

On July 25, Ant Group and Singapore's Nanyang Technological University announced a research partnership to advance Private Set Intersection (PSI) privacy‑computing technology using Ant's YinYu framework, aiming to improve secure machine‑learning and data‑analysis applications while aligning with regional data‑privacy initiatives.

Privacy Computinginformation securityntu
0 likes · 4 min read
Ant Group and Nanyang Technological University Launch Collaboration on Private Set Intersection Privacy Computing
Alibaba Cloud Developer
Alibaba Cloud Developer
Jul 21, 2023 · Information Security

Mastering Systematic Problem Solving for Complex Security Challenges

This article explores how to systematically tackle complex security problems by defining system thinking, distinguishing simple from complex issues, and applying a comprehensive, deep, and dynamic approach illustrated with a data‑leakage case study and practical recommendations for future security strategy.

case studycomplex problemsinformation security
0 likes · 16 min read
Mastering Systematic Problem Solving for Complex Security Challenges
21CTO
21CTO
Jul 20, 2023 · Information Security

Kevin Mitnick: From World’s Most Wanted Hacker to Security Guru

Kevin Mitnick, once dubbed the world’s most famous hacker and the first to be pursued by the FBI, transformed from a teenage social‑engineering prodigy into a celebrated information‑security consultant, author, and founder of Mitnick Security, leaving a lasting impact on computer security after his 2023 death.

Kevin Mitnickcomputer securityhacking
0 likes · 5 min read
Kevin Mitnick: From World’s Most Wanted Hacker to Security Guru
Efficient Ops
Efficient Ops
Jul 19, 2023 · Information Security

How Shenwan Hongyuan Achieved National‑Level DevSecOps Excellence

Shenwan Hongyuan Securities showcased its advanced DevSecOps capabilities by passing the CAICT's DevSecOps security and risk management assessment and DevOps continuous delivery level‑3 evaluation, sharing detailed cultural, process, and technical practices that boost software security across the full lifecycle.

Continuous DeliveryDevOpsDevSecOps
0 likes · 12 min read
How Shenwan Hongyuan Achieved National‑Level DevSecOps Excellence
IT Services Circle
IT Services Circle
Jul 13, 2023 · Information Security

Manual Mitigation Steps for BlackLotus UEFI Bootkit (CVE‑2023‑24932) and Microsoft’s Three‑Phase Update Strategy

This article explains the BlackLotus UEFI bootkit (CVE‑2023‑24932), outlines Microsoft's three‑phase remediation strategy, details the KB5025885 and KB5028166/KB5028185 updates, provides a simplified registry command for manual activation, and warns of compatibility issues for legacy boot managers.

BootkitCVE-2023-24932Secure Boot
0 likes · 6 min read
Manual Mitigation Steps for BlackLotus UEFI Bootkit (CVE‑2023‑24932) and Microsoft’s Three‑Phase Update Strategy
MaGe Linux Operations
MaGe Linux Operations
Jul 9, 2023 · Information Security

Master Internal Network Tunneling: NPS, FRP, EW, and NGROK Explained

This guide introduces several popular internal network tunneling tools—including NPS/NPC, FRP, EW, and NGROK—explaining their core principles, key features, installation steps, configuration files, and practical usage scenarios such as RDP, SSH, web services, file sharing, and advanced options like encryption, compression, TLS, and bandwidth limiting.

NPSewfrp
0 likes · 16 min read
Master Internal Network Tunneling: NPS, FRP, EW, and NGROK Explained
php Courses
php Courses
Jul 6, 2023 · Information Security

Anonymous Sudan Claims to Have Stolen Microsoft Customer Database; Microsoft Denies the Allegations

Anonymous Sudan alleges it has breached Microsoft’s servers and obtained a database containing over 30 million customer credentials, while Microsoft firmly denies any such breach, prompting widespread debate over the hacker group’s capabilities, motives, and the broader implications for information security.

Anonymous SudanCyberattackMicrosoft
0 likes · 4 min read
Anonymous Sudan Claims to Have Stolen Microsoft Customer Database; Microsoft Denies the Allegations
php Courses
php Courses
Jul 3, 2023 · Information Security

June API Security Vulnerability Report: MinIO, Joomla Rest API, and Argo CD Issues with Remediation Guidance

The June API security report highlights three critical vulnerabilities—MinIO unauthorized data exposure, Joomla Rest API unauthenticated access, and multiple Argo CD API flaws—detailing their impacts and providing concrete remediation steps to protect sensitive data and maintain system integrity.

API SecurityArgo CDJoomla
0 likes · 4 min read
June API Security Vulnerability Report: MinIO, Joomla Rest API, and Argo CD Issues with Remediation Guidance
Efficient Ops
Efficient Ops
Jun 24, 2023 · Information Security

How ICBC Built a DevSecOps Security Framework to Accelerate Safe Software Delivery

This article explains how ICBC's software development center integrated DevSecOps practices—embedding security awareness, automating toolchains, and using metric‑driven assessments—to reduce vulnerabilities, lower compliance risk, and support a cloud‑native, secure smart‑banking ecosystem.

DevSecOpsinformation securitysecurity automation
0 likes · 8 min read
How ICBC Built a DevSecOps Security Framework to Accelerate Safe Software Delivery
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Jun 22, 2023 · Information Security

Cloud DNS: Challenges, Security Risks, and Future Directions Discussed at the Alibaba Cloud & Tsinghua University Forum

The forum highlighted the growing importance of DNS in cloud-era digital transformation, presented security challenges of cloud‑based DNS load balancing, and outlined research findings and future "DNS+" strategies to ensure stable, scalable, and secure internet naming services.

DNSDigital Transformationinformation security
0 likes · 7 min read
Cloud DNS: Challenges, Security Risks, and Future Directions Discussed at the Alibaba Cloud & Tsinghua University Forum
HomeTech
HomeTech
Jun 21, 2023 · Information Security

Transparent Data Masking with AutoProxy Middleware at AutoHome

This article describes AutoHome's data security challenges in the big‑data era and explains how the self‑developed AutoProxy encryption middleware provides transparent, compliant data masking across legacy and new sensitive data, reducing cost, improving performance, and enabling automated masking workflows.

Transparent Encryptionauto-proxycompliance
0 likes · 8 min read
Transparent Data Masking with AutoProxy Middleware at AutoHome
Liangxu Linux
Liangxu Linux
Jun 20, 2023 · Information Security

How AI Hallucinations Fuel Fake NPM Package Attacks and What You Can Do

The article explains how ChatGPT's hallucinations can generate non‑existent package links that attackers register and weaponize, demonstrates the attack with a fake Node.js npm package, and offers practical steps to detect and prevent such supply‑chain threats.

AI securityChatGPT hallucinationfake npm packages
0 likes · 5 min read
How AI Hallucinations Fuel Fake NPM Package Attacks and What You Can Do
IT Services Circle
IT Services Circle
Jun 15, 2023 · Information Security

Microsoft Edge Image Super-Resolution Feature Raises Privacy Concerns and How to Disable It

Microsoft Edge's newly enabled image super‑resolution feature automatically enhances picture clarity but sends image URLs to Microsoft servers, prompting privacy concerns; the article explains the feature, its local processing claim, and provides step‑by‑step instructions to disable it in both stable and Canary builds.

Browser SettingsMicrosoft Edgeimage super-resolution
0 likes · 3 min read
Microsoft Edge Image Super-Resolution Feature Raises Privacy Concerns and How to Disable It
ITPUB
ITPUB
Jun 12, 2023 · Information Security

Inside Microsoft’s May 2023 Patch: Win32k Exploit Details and Visual Studio Vulnerability

Microsoft’s May 2023 security update addressed 52 CVEs, including a critical Win32k privilege‑escalation flaw (CVE‑2023‑29336) exploited in the wild and a Visual Studio installer UI vulnerability (CVE‑2023‑28299), with researchers detailing the attack vectors, proof‑of‑concept exploits, and mitigation strategies.

CVE-2023-29336MicrosoftVisual Studio
0 likes · 6 min read
Inside Microsoft’s May 2023 Patch: Win32k Exploit Details and Visual Studio Vulnerability
Architects Research Society
Architects Research Society
Jun 10, 2023 · Information Security

Roles and Responsibilities of a Security Architecture Team

The article outlines the composition of a security architecture team, detailing the roles of security architect, information security architect, chief information security officer, and security analyst, along with their business and technical skills, organizational relationships, and key responsibilities in managing enterprise security.

CISOSecurity AnalystSecurity Architecture
0 likes · 13 min read
Roles and Responsibilities of a Security Architecture Team
ITPUB
ITPUB
Jun 9, 2023 · Information Security

The 70 Largest Data Breaches in History: Impact, Details, and Lessons Learned

This comprehensive list chronicles the 70 biggest data breach incidents ever recorded, detailing dates, affected records, compromised data types, and the security failures that exposed personal information for companies ranging from social networks to financial institutions.

cybersecuritydata breachinformation security
0 likes · 43 min read
The 70 Largest Data Breaches in History: Impact, Details, and Lessons Learned
OPPO Amber Lab
OPPO Amber Lab
Jun 5, 2023 · Information Security

How ChatGPT Impacts Security: Key Insights from the CSA Seminar

An online CSA seminar on May 30 examined ChatGPT’s security impact, presenting a whitepaper and four AI‑security interaction dimensions, while experts discussed telecom‑operator security‑GPT models, safe vertical‑domain large‑model training, and future industry implications.

AI GovernanceAI securityChatGPT
0 likes · 7 min read
How ChatGPT Impacts Security: Key Insights from the CSA Seminar
Ziru Technology
Ziru Technology
Jun 2, 2023 · Information Security

Mastering Data Classification & Grading: Ziroom’s Compliance Blueprint

This article explains how Ziroom implements a comprehensive data classification and grading system to meet the 2021 Data Security Law, improve risk management, optimize security resources, and boost user trust through automated tools, multi‑level categorization, and continuous manual verification.

Data Governancecompliancedata classification
0 likes · 12 min read
Mastering Data Classification & Grading: Ziroom’s Compliance Blueprint
Java Architect Essentials
Java Architect Essentials
May 26, 2023 · Information Security

Step‑by‑Step WordPress Site Penetration Testing Tutorial

This tutorial walks beginners through the entire process of compromising a WordPress website, from initial information gathering and DNS enumeration to vulnerability scanning, exploitation with tools like sqlmap and nmap, privilege escalation, and establishing persistent backdoors.

SQLMapWebshellWordPress
0 likes · 10 min read
Step‑by‑Step WordPress Site Penetration Testing Tutorial
Python Programming Learning Circle
Python Programming Learning Circle
May 25, 2023 · Artificial Intelligence

AI Deepfake Scams: How Synthetic Faces and Voices Enable Fraud and What to Watch For

AI-powered deepfake technology is increasingly being exploited for sophisticated scams, as illustrated by a case where a company executive transferred 4.3 million yuan to a fraudster using a fabricated video call, prompting urgent warnings about the need for verification, emerging regulations, and the broader misuse of face‑swap tools.

AI deepfakedeepfake toolsfraud
0 likes · 5 min read
AI Deepfake Scams: How Synthetic Faces and Voices Enable Fraud and What to Watch For
Data Thinking Notes
Data Thinking Notes
May 21, 2023 · Information Security

Why Government Data Sharing Stalls and How a “Three‑Rights” Model Can Unlock It

The article analyzes why government data sharing often fails—citing legal, technical, security, and organizational hurdles—then outlines one‑to‑one and centralized sharing models, highlights four critical success factors, and proposes a “three‑rights” framework supported by blockchain to create trustworthy, sustainable inter‑departmental data exchange.

Big DataBlockchainData Governance
0 likes · 11 min read
Why Government Data Sharing Stalls and How a “Three‑Rights” Model Can Unlock It
MaGe Linux Operations
MaGe Linux Operations
May 21, 2023 · Information Security

Step‑by‑Step Webshell Upload and Kernel Privilege Escalation on Ubuntu 16.04

This tutorial walks through setting up an Ubuntu 16.04 vulnerable environment, gathering information, uploading a webshell via MySQL into outfile or log injection, establishing a reverse shell with Metasploit, and finally exploiting CVE‑2021‑4034 for kernel privilege escalation, while also covering post‑exploitation persistence techniques.

KaliLinuxMetasploit
0 likes · 10 min read
Step‑by‑Step Webshell Upload and Kernel Privilege Escalation on Ubuntu 16.04
AntTech
AntTech
May 12, 2023 · Information Security

Exploring a Composite Data Security Governance System: Practices from Ant Group at the 6th Digital China Summit

At the 6th Digital China Construction Summit in Fuzhou, Ant Group’s Song Zheng presented a comprehensive data security governance framework that integrates strategy, management, and technology, outlining four key characteristics—strategic positioning, combat‑driven implementation, full‑staff participation, and technological breakthrough—to guide industry practice.

data securitydigital Chinainformation security
0 likes · 3 min read
Exploring a Composite Data Security Governance System: Practices from Ant Group at the 6th Digital China Summit
vivo Internet Technology
vivo Internet Technology
May 10, 2023 · Information Security

Detecting Apache Commons Text RCE (CVE-2022-42889) with the Doop Static Analysis Framework

The Vivo Internet Security Team demonstrates how to extend the Doop static analysis framework with custom Datalog rules to detect the Apache Commons Text CVE‑2022‑42889 remote code execution vulnerability by tracing taint from StringSubstitutor.replace to ScriptEngine.eval, producing source‑sink CSV reports and showcasing Doop’s extensibility for security research.

Apache Commons TextCVE-2022-42889Datalog
0 likes · 14 min read
Detecting Apache Commons Text RCE (CVE-2022-42889) with the Doop Static Analysis Framework
AntTech
AntTech
May 9, 2023 · Information Security

Ant Group’s Biometric Security Testing Lab: Automated Detection and Evaluation of Fingerprint and Face Recognition Systems

The article details Ant Group’s Ant Security Tianji Lab’s end‑to‑end biometric security testing framework, covering standards, automated 1.0‑2.0‑3.0 detection stages, fingerprint and face‑recognition attack materials, intelligent AI‑driven countermeasures, and a 24/7 robotic testing infrastructure.

AI testingRoboticsbiometric security
0 likes · 25 min read
Ant Group’s Biometric Security Testing Lab: Automated Detection and Evaluation of Fingerprint and Face Recognition Systems
Liangxu Linux
Liangxu Linux
May 2, 2023 · Information Security

Kali Linux vs Parrot OS: Which Penetration Testing Distro Is Right for You?

An in‑depth comparison of Kali Linux and Parrot OS examines their origins, pre‑installed security tools, customization options, hardware requirements, user interfaces, and performance, helping security professionals and enthusiasts choose the most suitable Linux distribution for penetration testing and privacy‑focused work.

Kali LinuxLinux DistributionParrot OS
0 likes · 10 min read
Kali Linux vs Parrot OS: Which Penetration Testing Distro Is Right for You?
iQIYI Technical Product Team
iQIYI Technical Product Team
Apr 28, 2023 · Information Security

Definition, Role, and Implementation of DRM (Digital Rights Management) – iQIYI Case Study

DRM safeguards digital content by authenticating users and encrypting streams, a necessity highlighted by iQIYI’s shift from free distribution to paid membership, prompting a dual‑layer architecture that combines hardware‑based Trusted Execution Environment protection with flexible software SDKs, continuously assessed and evolving to balance security, cost, and user experience.

Content ProtectionDRMDigital Rights Management
0 likes · 9 min read
Definition, Role, and Implementation of DRM (Digital Rights Management) – iQIYI Case Study
JD Tech
JD Tech
Apr 26, 2023 · Information Security

Overview of JD.com's Five‑Element Zero Trust Security Framework

This whitepaper outlines JD.com's practical zero‑trust security approach, detailing a five‑element framework that includes asset digitization, asset identity, diversified security checkpoints, a strategy center, and a zero‑trust cockpit, to help digital enterprises strengthen security, reduce costs, and meet regulatory requirements.

Digital TransformationJD.comZero Trust
0 likes · 6 min read
Overview of JD.com's Five‑Element Zero Trust Security Framework
Bilibili Tech
Bilibili Tech
Apr 18, 2023 · Cloud Native

Kubernetes Audit Log Analysis for Container Security

The article explains how to enable Kubernetes audit logging and use its detailed fields—such as userAgent, responseStatus, requestURI, and object references—to detect CDK‑generated attacks and other threats like CVE‑2022‑3172, privilege escalation, and backdoor deployment, offering practical detection examples and security recommendations.

API ServerAudit loggingCDK
0 likes · 15 min read
Kubernetes Audit Log Analysis for Container Security
Open Source Linux
Open Source Linux
Apr 15, 2023 · Information Security

Understanding Phishing: Types, Tactics, and Prevention Strategies

This article explains how phishing exploits human psychology, outlines common phishing variants such as email, spear, whaling, business email compromise, smishing, vishing, social‑media, pharming and evil‑twin attacks, and provides practical measures to recognize and defend against them.

cyberattack preventionemail securityinformation security
0 likes · 10 min read
Understanding Phishing: Types, Tactics, and Prevention Strategies
Efficient Ops
Efficient Ops
Apr 8, 2023 · Information Security

How China Postal Savings Bank Reached Advanced DevSecOps Maturity – Lessons and Practices

The article details China Postal Savings Bank's successful DevSecOps assessment at the 2023 GOPS Global Operations Conference, sharing the bank's project background, interview insights on culture, processes, and tooling, and outlining the benefits and future plans of adopting standardized DevSecOps practices.

BankingDevSecOpsMaturity Model
0 likes · 17 min read
How China Postal Savings Bank Reached Advanced DevSecOps Maturity – Lessons and Practices
AntTech
AntTech
Apr 7, 2023 · Information Security

Ant Group Launches Cybersecurity Student Innovation Funding Program to Foster Industry‑Academia Collaboration

In 2022, Ant Group and leading cybersecurity firms launched a five‑year funding program to support 1,200 students in open‑source security projects, linking academic research with real‑world industry needs and achieving high academic performance across the first reporting phase.

cybersecurityindustry‑academiainformation security
0 likes · 4 min read
Ant Group Launches Cybersecurity Student Innovation Funding Program to Foster Industry‑Academia Collaboration
Python Programming Learning Circle
Python Programming Learning Circle
Mar 31, 2023 · Information Security

Backdoors in Software: Real-World Cases, Legal Perspectives, and Security Implications

The article recounts real-world examples of hidden backdoors in software—from an Android ROM project and Ken Thompson’s compiler-level exploit—to discuss their legal ambiguity in China, highlight the challenges of detection, and conclude with a call for developers to share their own experiences, alongside a promotional Python course.

AndroidSoftware Securitybackdoor
0 likes · 6 min read
Backdoors in Software: Real-World Cases, Legal Perspectives, and Security Implications
dbaplus Community
dbaplus Community
Mar 28, 2023 · Information Security

How a Redis Client Bug Exposed ChatGPT User Data and What OpenAI Fixed

A recent bug in the open‑source redis‑py library caused ChatGPT to leak personal data of about 1.2 % of Plus users, allowing some users to see others' names, emails, and partial credit‑card details; OpenAI issued an apology, published a post‑mortem, and deployed a patch to fix the Redis Cluster async client issue.

ChatGPTOpenAIasyncio
0 likes · 6 min read
How a Redis Client Bug Exposed ChatGPT User Data and What OpenAI Fixed
21CTO
21CTO
Mar 28, 2023 · Information Security

Why Did Twitter Issue a DMCA Takedown on Its Own Leaked Source Code?

Twitter filed a DMCA request to force GitHub to remove a repository exposing proprietary code, while also seeking a court order to identify the leaker, highlighting the security risks and legal complexities of source‑code leaks in the era of high‑profile tech acquisitions.

DMCAGitHubTwitter
0 likes · 5 min read
Why Did Twitter Issue a DMCA Takedown on Its Own Leaked Source Code?
Top Architect
Top Architect
Mar 13, 2023 · Information Security

Understanding Single Sign‑On (SSO) and CAS Authentication Flows

This article explains the concept, background, and definition of Single Sign‑On (SSO), outlines three SSO deployment types, introduces the Central Authentication Service (CAS) with detailed ticket mechanisms, and provides step‑by‑step SSO and Single Logout (SLO) processes for multiple applications.

AuthenticationCASSSO
0 likes · 11 min read
Understanding Single Sign‑On (SSO) and CAS Authentication Flows
Programmer DD
Programmer DD
Mar 12, 2023 · Information Security

GitHub’s 2FA Mandate: Boosting Software Supply Chain Security

Starting March 13, 2023, GitHub will enforce two‑factor authentication for all contributors, rolling out the requirement gradually based on activity and project impact, to strengthen the global software supply chain against account takeover attacks and align with broader cybersecurity policies.

Developer SecurityGitHubTwo-Factor Authentication
0 likes · 6 min read
GitHub’s 2FA Mandate: Boosting Software Supply Chain Security
DataFunTalk
DataFunTalk
Mar 10, 2023 · Information Security

Data Security Management Practices and Future Outlook in a Large Commercial Bank

The article outlines a large commercial bank’s understanding of data security, shares its comprehensive management practices—including governance, lifecycle protection, technical support, and industry collaboration—and presents a forward‑looking perspective on future challenges and enhancements in data security.

Financial IndustryPrivacy Computingdata security
0 likes · 16 min read
Data Security Management Practices and Future Outlook in a Large Commercial Bank