Tagged articles
981 articles
Page 5 of 10
MaGe Linux Operations
MaGe Linux Operations
Mar 5, 2023 · Information Security

Top 10 Vulnerability Scanners Every Security Team Needs

This guide reviews the ten leading vulnerability scanning solutions, detailing each tool's key features, deployment options, and how they help organizations detect and remediate security weaknesses across networks, servers, cloud and container environments.

information securitynetwork securityopen‑source
0 likes · 7 min read
Top 10 Vulnerability Scanners Every Security Team Needs
Java Architect Essentials
Java Architect Essentials
Feb 25, 2023 · Information Security

Analysis of Phone and Electricity Recharge Money‑Laundering Schemes in Illicit Apps

The article investigates how certain illicit mobile applications use phone‑bill and electricity‑bill recharge interfaces to launder money, describing the hidden industry chain, the roles of unsuspecting users, the various payment methods involved, and the challenges of tracing the illicit funds.

illicit appsinformation securitymoney laundering
0 likes · 11 min read
Analysis of Phone and Electricity Recharge Money‑Laundering Schemes in Illicit Apps
MaGe Linux Operations
MaGe Linux Operations
Feb 25, 2023 · Information Security

Top 10 Website Security Threats & How to Defend Your Site

This article examines the ten most common website security attacks—from XSS and SQL injection to DDoS and phishing—explaining their motivations, mechanisms, and practical mitigation strategies such as WAF deployment, input sanitization, SSL encryption, and regular updates to help protect any online presence.

DDoSMitigationSSL
0 likes · 14 min read
Top 10 Website Security Threats & How to Defend Your Site
AntTech
AntTech
Feb 16, 2023 · Information Security

Evolution of Ant Group's Risk Control Platforms and Data Security Strategies

The article outlines the five‑generation evolution of Ant Group's risk control platforms, the technical and operational challenges faced, the shift toward data‑driven and AI‑enabled security, and the organization’s comprehensive data and network protection measures alongside emerging technologies such as graph risk, blockchain, and privacy computing.

Ant GroupArtificial Intelligenceinformation security
0 likes · 14 min read
Evolution of Ant Group's Risk Control Platforms and Data Security Strategies
DataFunSummit
DataFunSummit
Feb 14, 2023 · Information Security

Digital Watermarking Techniques for Data Leakage Traceability and Protection

This article presents a comprehensive overview of digital watermarking, covering its history, evaluation metrics, various media implementations, challenges posed by AI, and practical applications—especially in e‑commerce—to protect data throughout its lifecycle and enable effective leakage tracing.

Steganographydata leakagedatabase watermark
0 likes · 16 min read
Digital Watermarking Techniques for Data Leakage Traceability and Protection
Bilibili Tech
Bilibili Tech
Feb 10, 2023 · Information Security

Digital Watermarking Technology: Concepts, Features, Algorithms, and Applications

The paper surveys digital watermarking, detailing its definition, security features, embedding models, key algorithms across spatial, transform, and compression domains, and applications such as copyright protection, anti‑counterfeiting, tamper detection, and covert communication, while outlining future robustness challenges and prospects.

ApplicationsLSB algorithmRobustness
0 likes · 18 min read
Digital Watermarking Technology: Concepts, Features, Algorithms, and Applications
21CTO
21CTO
Jan 29, 2023 · Information Security

What the Yandex Source Code Leak Reveals About Security Risks

In July 2022 a former Yandex employee stole 44.7 GB of the company's source code, exposing internal architecture across dozens of services, prompting security experts to warn that while no user data was leaked, the breach could enable future targeted attacks.

MonorepoYandexinformation security
0 likes · 6 min read
What the Yandex Source Code Leak Reveals About Security Risks
Efficient Ops
Efficient Ops
Jan 11, 2023 · Information Security

How Anxin Securities Achieved Advanced DevSecOps Maturity in Financial Services

Anxin Securities' Financial Store system passed the level‑2 DevSecOps assessment by China CAICT, showcasing how cultural, process, and technical practices were integrated to enhance security, efficiency, and digital transformation in a large‑scale financial trading platform.

DevOpsDevSecOpsDigital Transformation
0 likes · 14 min read
How Anxin Securities Achieved Advanced DevSecOps Maturity in Financial Services
Efficient Ops
Efficient Ops
Jan 11, 2023 · Information Security

How Zhongtai Securities Achieved Advanced DevSecOps Maturity

Zhongtai Securities shares how adopting DevSecOps standards, integrating security into every stage of its DevOps pipeline, and leveraging automated testing tools dramatically improved delivery speed, reduced vulnerabilities, and positioned the firm at an advanced domestic security level, as confirmed by the latest CAICT assessment.

Continuous DeliveryDevOpsDevSecOps
0 likes · 12 min read
How Zhongtai Securities Achieved Advanced DevSecOps Maturity
Laravel Tech Community
Laravel Tech Community
Jan 10, 2023 · Information Security

Dongle: A Lightweight, Semantic, Developer‑Friendly Go Library for Encoding, Decoding, and Cryptographic Operations

Dongle is a lightweight, Go-based library offering extensive encoding/decoding and cryptographic functions—including various hash, HMAC, and symmetric/asymmetric algorithms—along with recent updates such as tea‑mode support, empty‑string padding, and code restructuring, and is featured in the awesome‑go collection.

encodinginformation security
0 likes · 4 min read
Dongle: A Lightweight, Semantic, Developer‑Friendly Go Library for Encoding, Decoding, and Cryptographic Operations
Efficient Ops
Efficient Ops
Jan 10, 2023 · Information Security

How China’s Leading Bank Achieved Advanced DevSecOps Maturity: An Inside Interview

This article reports on the China Academy of Information and Communications Technology's DevOps standard assessments, highlights Industrial and Commercial Bank of China's successful Level‑2 DevSecOps evaluation, and presents an in‑depth interview revealing the bank’s cultural, process, and technical practices that boosted its security risk management and digital transformation.

BankingDevOps StandardsDevSecOps
0 likes · 11 min read
How China’s Leading Bank Achieved Advanced DevSecOps Maturity: An Inside Interview
Continuous Delivery 2.0
Continuous Delivery 2.0
Jan 10, 2023 · Information Security

Understanding Software Supply Chain Security and the SLSA Framework

The article explains why software supply chain security is increasingly critical, introduces the SLSA (Supply‑Chain Levels for Software Artifacts) framework and its three trust boundaries, outlines common risk points from code commit to package distribution, and discusses mitigation strategies such as mandatory code review, robot‑account controls, and automation.

SLSAci/cdinformation security
0 likes · 11 min read
Understanding Software Supply Chain Security and the SLSA Framework
Liangxu Linux
Liangxu Linux
Jan 3, 2023 · Information Security

Why Can Public Key Encrypt but Not Decrypt? Unpacking HTTPS Encryption

An in‑depth guide explains the difference between symmetric and asymmetric encryption, why a public key can encrypt but not decrypt, and walks through the TLS 1.2 handshake that underpins HTTPS, covering certificates, random numbers, session key derivation, and the role of public‑private key pairs.

HTTPSHandshakeTLS
0 likes · 16 min read
Why Can Public Key Encrypt but Not Decrypt? Unpacking HTTPS Encryption
Efficient Ops
Efficient Ops
Dec 29, 2022 · Information Security

Mastering AD Domain Security: Attack Techniques and Defense Strategies

This article explains how Active Directory domains work, outlines over 220 attack techniques such as SPN scanning, password spraying, Kerberoasting, DCSync, and privilege‑escalation exploits, and then presents comprehensive defense measures including attack‑surface reduction, strict admin hygiene, network isolation, honeypots, and continuous monitoring.

Active DirectoryAttack TechniquesDefense Strategies
0 likes · 15 min read
Mastering AD Domain Security: Attack Techniques and Defense Strategies
21CTO
21CTO
Dec 28, 2022 · Information Security

Okta’s Private GitHub Repo Breached: Source Code Stolen but Services Remain Safe

Okta disclosed that attackers copied source code from its private GitHub repositories, yet the breach did not affect its services, customer data, or HIPAA, FedRAMP, and DoD customers, and the company took immediate remedial actions to secure its accounts.

GitHub breachIdentity ManagementOkta
0 likes · 4 min read
Okta’s Private GitHub Repo Breached: Source Code Stolen but Services Remain Safe
Open Source Linux
Open Source Linux
Dec 9, 2022 · Information Security

Top 10 Linux Antivirus Tools to Secure Your Servers

Although Linux is widely regarded as secure, its dominance in web servers makes it a prime target for malware, so this guide reviews the ten most effective antivirus solutions for Linux, explaining their features, usage, and why they matter for protecting your systems.

information securitymalware detection
0 likes · 6 min read
Top 10 Linux Antivirus Tools to Secure Your Servers
Open Source Linux
Open Source Linux
Dec 5, 2022 · Fundamentals

What Jiang Zemin’s 2008 Vision Reveals About China’s Future IT Industry

This article summarizes Jiang Zemin’s 2008 paper on China’s information technology industry, highlighting his 24‑character strategic guideline, the emphasis on autonomous innovation in microelectronics, software, cloud computing, and the enduring relevance of his insights for today’s tech development.

ChinaIT industryinformation security
0 likes · 9 min read
What Jiang Zemin’s 2008 Vision Reveals About China’s Future IT Industry
Liangxu Linux
Liangxu Linux
Nov 28, 2022 · Information Security

Master Wireshark: Interface, Capture, and Advanced Filtering Techniques

This guide walks you through Wireshark’s main interface, demonstrates simple packet captures, explains how to use capture and display filters with concrete examples, and details TCP three‑handshake analysis, providing practical tips for network engineers and security analysts.

Packet CaptureTCP handshakeWireshark
0 likes · 13 min read
Master Wireshark: Interface, Capture, and Advanced Filtering Techniques
AntTech
AntTech
Nov 28, 2022 · Information Security

Ant Group Anti‑Intrusion Platform: Architecture, Trillion‑Scale Detection, Risk Assessment, and Automated Response

This article details the evolution, architecture, and key technologies of Ant Group's anti‑intrusion platform, explaining how it handles trillion‑level data streams for intrusion detection, performs multi‑dimensional risk assessment and attribution, and enables rapid, automated security incident response across massive enterprise environments.

anti-intrusioninformation securityintrusion detection
0 likes · 15 min read
Ant Group Anti‑Intrusion Platform: Architecture, Trillion‑Scale Detection, Risk Assessment, and Automated Response
DataFunSummit
DataFunSummit
Nov 25, 2022 · Information Security

Black and Gray Market Threats and Countermeasures in the Residential Services Industry

This article presents a comprehensive analysis of black‑gray market activities in the residential services sector, detailing industry service models, typical fraud scenarios, intelligence‑gathering architecture, traceability capabilities, and multi‑stage counter‑measure processes aimed at detection, investigation, and prosecution.

Intelligenceanti-fraudblack market
0 likes · 11 min read
Black and Gray Market Threats and Countermeasures in the Residential Services Industry
Java Backend Technology
Java Backend Technology
Nov 25, 2022 · Information Security

Are Hidden Backdoors in Software Legal? Real Cases and Expert Insights

This article shares three Zhihu answers that explore a hidden backdoor in an Android ROM, the ambiguous legal status of software backdoors in China, and historic compiler‑level backdoors like Ken Thompson's, highlighting the technical and legal complexities of hidden vulnerabilities.

android ROMcompiler securityinformation security
0 likes · 7 min read
Are Hidden Backdoors in Software Legal? Real Cases and Expert Insights
IT Services Circle
IT Services Circle
Nov 19, 2022 · Information Security

New Internet Comment Service Management Regulations Effective December 15, 2022

The National Internet Information Office's revised Internet Comment Service Management Regulations, effective December 15, 2022, mandate real‑name authentication, user tiering, blacklist of serious defaulters, stringent personal data protection, pre‑review of news comments, and comprehensive security measures for online comment platforms.

Comment ManagementData ProtectionInternet Regulation
0 likes · 6 min read
New Internet Comment Service Management Regulations Effective December 15, 2022
Code Ape Tech Column
Code Ape Tech Column
Nov 17, 2022 · Information Security

Java Code Obfuscation with ProGuard: A Step‑by‑Step Guide

This article explains how Java source files are compiled into class files, how they can be decompiled, and provides a detailed, code‑rich tutorial on protecting a Spring Boot project by configuring ProGuard through a proguard.cfg file and Maven plugin to produce an obfuscated JAR.

ProGuardbackend-developmentcode obfuscation
0 likes · 7 min read
Java Code Obfuscation with ProGuard: A Step‑by‑Step Guide
Programmer DD
Programmer DD
Nov 11, 2022 · Information Security

How a Twitter Engineer Cut Mobile Bandwidth by 40% and Faced a Privacy Dilemma

In 2015‑2016, Twitter engineer Steve Krenzel reduced mobile bandwidth consumption by about 40% through gzip‑compressed request logging, only to confront an ethical clash when a telecom client demanded identifiable user location data, leading him to reject the request and eventually leave the company.

Data EthicsTwitterbandwidth optimization
0 likes · 8 min read
How a Twitter Engineer Cut Mobile Bandwidth by 40% and Faced a Privacy Dilemma
政采云技术
政采云技术
Nov 7, 2022 · Information Security

Zhejiang Government Procurement Cloud's Data Security and Compliance Framework

Zhejiang Government Procurement Cloud's CTO Liu Changyu presented at the Cloud Summit, detailing the company's comprehensive data security and compliance framework including 'three-in-one' certifications, 'four-in-one' data security construction, and intelligent data classification strategies.

Regulatory Compliancecompliance frameworkdata classification
0 likes · 5 min read
Zhejiang Government Procurement Cloud's Data Security and Compliance Framework
DataFunSummit
DataFunSummit
Nov 5, 2022 · Information Security

TECC: A New Approach to Trusted Enclave Confidential Computing – Architecture, Security, and Performance

The article introduces TECC, a privacy‑computing framework that balances security and performance by using trusted execution environments, data secret‑sharing, lightweight cryptographic protocols, and Rust‑based implementation to enable near‑plaintext speed for secure multi‑party machine learning and data analysis.

Privacy ComputingRustTECC
0 likes · 10 min read
TECC: A New Approach to Trusted Enclave Confidential Computing – Architecture, Security, and Performance
Ops Development Stories
Ops Development Stories
Oct 31, 2022 · Information Security

Essential Security Checklist for Ops: From Port Hardening to Data Protection

This article shares practical security best practices for operations teams, covering why security is often overlooked, real incident examples, and detailed guidelines on port hardening, system hardening (login management, vulnerability scanning, baseline checks), application, network, and data protection, emphasizing continuous investment and simple safeguards.

OperationsSystem Hardeningbest practices
0 likes · 8 min read
Essential Security Checklist for Ops: From Port Hardening to Data Protection
Architects Research Society
Architects Research Society
Oct 22, 2022 · Information Security

Enterprise Information Security Architecture (EISA): Structure, Content, and Implementation Approaches

Enterprise Information Security Architecture (EISA) provides a structured framework that links business drivers with technical guidance through three perspectives—business, information, and technology—detailing its documentation layers, strategic approaches, and the integration of security into overall enterprise architecture to enable effective, iterative security programs.

Architecture ModelsEISASecurity Planning
0 likes · 7 min read
Enterprise Information Security Architecture (EISA): Structure, Content, and Implementation Approaches
MaGe Linux Operations
MaGe Linux Operations
Oct 21, 2022 · Information Security

What the Microsoft BlueBleed Leak Reveals About Cloud Misconfigurations

A misconfigured Azure Blob storage bucket exposed 2.4 TB of sensitive data from over 65,000 entities in 111 countries, prompting Microsoft to acknowledge the breach, dispute its scale, and outline best practices while highlighting cloud storage misconfigurations as a leading attack vector.

AzureMicrosoftcloud security
0 likes · 7 min read
What the Microsoft BlueBleed Leak Reveals About Cloud Misconfigurations
Open Source Linux
Open Source Linux
Oct 19, 2022 · Information Security

How to Crack Wi‑Fi Passwords with Python: A Step‑by‑Step Guide

This tutorial walks through building a Python script that scans nearby Wi‑Fi networks and performs brute‑force password cracking, first using a command‑line approach and then enhancing it with a Tkinter graphical interface, while also discussing limitations and possible multithreading improvements.

PythonTkinterbrute force
0 likes · 14 min read
How to Crack Wi‑Fi Passwords with Python: A Step‑by‑Step Guide
php Courses
php Courses
Oct 18, 2022 · Information Security

In-Memory PHP Trojan: Source Code, Explanation, and Mitigation

This article explains the concept of in‑memory PHP trojans, provides simple obfuscated source code that deletes itself and persists in RAM, discusses their stealth characteristics, and offers a basic mitigation strategy of terminating the process and removing the generated files.

Memory TrojanPHPcode obfuscation
0 likes · 3 min read
In-Memory PHP Trojan: Source Code, Explanation, and Mitigation
DevOps Cloud Academy
DevOps Cloud Academy
Sep 27, 2022 · Information Security

Securing Version Control Systems and CI/CD Pipelines in the Software Supply Chain

The article explains how vulnerabilities in version control systems and CI/CD pipelines can expose the software supply chain to attacks and provides best‑practice recommendations for hardening VCS configurations, branch protection, least‑privilege access, secure testing environments, and credential management.

CI/CD securityVCS securityinformation security
0 likes · 9 min read
Securing Version Control Systems and CI/CD Pipelines in the Software Supply Chain
21CTO
21CTO
Sep 25, 2022 · Information Security

How a 15-Year-Old Python Tarfile Flaw Still Threatens 350k Open-Source Projects

Security firm Trellix warns that the 15-year-old CVE-2007-4559 directory-traversal flaw in Python’s built-in tarfile module remains unpatched, potentially allowing attackers to execute arbitrary code on any system using Python, and affecting an estimated 350,000 open-source projects across diverse domains.

CVE-2007-4559PythonSecurity Vulnerability
0 likes · 5 min read
How a 15-Year-Old Python Tarfile Flaw Still Threatens 350k Open-Source Projects
Architect
Architect
Sep 22, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article examines various techniques for enabling fuzzy search on encrypted data, comparing naïve, conventional, and advanced algorithmic approaches, evaluating their security, performance, and storage trade‑offs, and provides practical implementation guidance and reference resources.

data privacydatabaseencryption
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data
Open Source Linux
Open Source Linux
Sep 21, 2022 · Information Security

WebCrack: Automated Bulk Weak‑Password Detection for Web Back‑Ends

WebCrack is an open‑source tool that automates the discovery of weak or universal passwords across a wide range of web‑based CMS back‑ends by automatically identifying login parameters, evaluating login success, applying dynamic dictionaries, and supporting custom rule files, all while handling diverse response patterns and WAF interference.

CMS detectionWeb Automationinformation security
0 likes · 13 min read
WebCrack: Automated Bulk Weak‑Password Detection for Web Back‑Ends
vivo Internet Technology
vivo Internet Technology
Sep 21, 2022 · Information Security

Vivo Qianjing Cup Cybersecurity Challenge 2022 Launches

The 2022 Vivo Qianjing Cup Cybersecurity Challenge, launched on September 15 under the “Assemble! Geek Youth” theme, invites nationwide security enthusiasts to uncover vulnerabilities in Vivo products through online puzzles and an offline final, offering a 200,000‑yuan prize pool plus uncapped bounty rewards and judging by experts from AWS, Ant Group and leading universities.

cybersecurityinformation securityprivacy protection
0 likes · 5 min read
Vivo Qianjing Cup Cybersecurity Challenge 2022 Launches
NetEase Smart Enterprise Tech+
NetEase Smart Enterprise Tech+
Sep 20, 2022 · Information Security

How GameSentry Simplifies Game Security Testing: Design, Risks, and Open‑Source Benefits

GameSentry, an open‑source tool from NetEase Yidun, streamlines game security testing by analyzing protocols, function logic, memory, and code hot‑updates, offering detailed risk categories, testing steps, and advantages that lower the barrier for developers to detect vulnerabilities before release.

GameSentryMobile Gamesinformation security
0 likes · 12 min read
How GameSentry Simplifies Game Security Testing: Design, Risks, and Open‑Source Benefits
Code Ape Tech Column
Code Ape Tech Column
Sep 14, 2022 · Information Security

Understanding BCrypt and Password Hashing in Spring Security

This article explains the differences between hashing and encryption, demonstrates Java's built‑in hash implementations, discusses the insecurity of MD5 and rainbow‑table attacks, and provides a detailed guide on using BCrypt with Spring Security, including code examples and the PasswordEncoder interface.

bcryptencryptioninformation security
0 likes · 12 min read
Understanding BCrypt and Password Hashing in Spring Security
Top Architect
Top Architect
Aug 28, 2022 · Information Security

Designing Permission Management and RBAC Models: From Basic Needs to Ideal Architectures

This article explains why permission management is essential for data security, introduces various permission models including basic RBAC, role inheritance, constrained RBAC, and discusses user grouping, organization‑based roles, and detailed database schema designs for both standard and ideal RBAC systems.

RBACRole InheritanceSystem Design
0 likes · 16 min read
Designing Permission Management and RBAC Models: From Basic Needs to Ideal Architectures
Sohu Tech Products
Sohu Tech Products
Aug 24, 2022 · Information Security

Approaches to Fuzzy Query on Encrypted Data

This article examines why encrypted data is unfriendly to fuzzy search, categorizes three implementation strategies—naïve, conventional, and advanced—analyzes their advantages and drawbacks, and recommends practical solutions for secure yet searchable encrypted fields.

data privacyfuzzy-searchinformation security
0 likes · 10 min read
Approaches to Fuzzy Query on Encrypted Data
OPPO Amber Lab
OPPO Amber Lab
Aug 24, 2022 · Information Security

Top Security Experts Reveal Cutting‑Edge Solutions for System, AI & Privacy

The 2022 CCF enterprise security seminar in Shenzhen gathered leading researchers and industry specialists to discuss challenges such as ASLR on IoT, millimeter‑wave voice attacks, data‑fusion privacy, mobile fraud, deep‑fake risks, while OPPO showcased ColorOS security innovations and multiple international certifications.

IoTOPPOai
0 likes · 6 min read
Top Security Experts Reveal Cutting‑Edge Solutions for System, AI & Privacy
Architect's Tech Stack
Architect's Tech Stack
Aug 24, 2022 · Information Security

Techniques for Performing Fuzzy Search on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and presents three categories of solutions—naïve, conventional, and advanced—detailing their implementation ideas, performance trade‑offs, and practical recommendations for secure and efficient query processing.

data privacyfuzzy-searchinformation security
0 likes · 11 min read
Techniques for Performing Fuzzy Search on Encrypted Data
DataFunSummit
DataFunSummit
Aug 20, 2022 · Information Security

Content Risk Control Industry Overview and Evaluation System

The article reviews the development background of the digital economy‑driven content risk control industry, examines current content moderation technologies and challenges, describes the establishment of a content technology promotion alliance, outlines its research directions and evaluation standards, and includes a Q&A on regulatory collaboration.

Artificial IntelligenceStandardscontent moderation
0 likes · 16 min read
Content Risk Control Industry Overview and Evaluation System
Java Architect Essentials
Java Architect Essentials
Aug 20, 2022 · Information Security

Techniques for Performing Fuzzy Search on Encrypted Data

This article examines why encrypted data is unfriendly to fuzzy queries, categorizes three implementation approaches—naïve, conventional, and advanced—and evaluates their security, performance, and storage trade‑offs while providing practical code examples and reference resources.

algorithmdata privacyfuzzy-search
0 likes · 10 min read
Techniques for Performing Fuzzy Search on Encrypted Data
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Aug 19, 2022 · Information Security

Huolala’s First Security Salon: Purple Team, Data Compliance & Platform Design

The online Huolala Security Salon on August 19 featured eight expert sessions covering enterprise security foundations, purple‑team tactics, security training programs, data‑security compliance practices, LLSRC award recognitions, game vulnerability analysis, the evolution of code‑audit techniques, and the design of a flexible security operations platform.

Security OperationsSecurity TrainingVulnerability Management
0 likes · 7 min read
Huolala’s First Security Salon: Purple Team, Data Compliance & Platform Design
Baidu App Technology
Baidu App Technology
Aug 11, 2022 · Information Security

How Baidu’s bdtls Protocol Secures Mini‑Programs with TLS 1.3‑Inspired Design

This article explains Baidu’s custom bdtls security communication protocol for mini‑programs, detailing its TLS 1.3‑based architecture, DHE‑RSA key exchange, AES‑GCM encryption, implementation on both server and client sides, and the strategies used to achieve strong security, low latency, high availability, and extensibility.

TLSbdtlsencryption
0 likes · 23 min read
How Baidu’s bdtls Protocol Secures Mini‑Programs with TLS 1.3‑Inspired Design
21CTO
21CTO
Aug 8, 2022 · Cloud Computing

How Alibaba Cloud, Python’s Surge, and GitLab’s Policies Reveal Tech Shifts

Alibaba Cloud reports slowing internet demand but rising industrial digitalization, while Python hits a historic market‑share high and GitLab bans Windows and prunes idle projects, together highlighting evolving trends in cloud strategy, programming language popularity, and open‑source platform security.

Alibaba CloudGitLabPython
0 likes · 5 min read
How Alibaba Cloud, Python’s Surge, and GitLab’s Policies Reveal Tech Shifts
21CTO
21CTO
Aug 6, 2022 · Information Security

How Twitter Fixed a Critical Bug and Stopped a 5.4M‑Account Data Leak

Twitter’s tech team patched a major security flaw that exposed email addresses and phone numbers of over 5.4 million accounts, prompting a $30,000 data sale on Breached Forums and a $5,040 bug‑bounty reward for the researcher who reported it.

Bug BountySecurity BreachTwitter
0 likes · 3 min read
How Twitter Fixed a Critical Bug and Stopped a 5.4M‑Account Data Leak
Ziru Technology
Ziru Technology
Aug 5, 2022 · Information Security

Why Network Security Incident Response Matters: Strategies, Plans, and Real‑World Cases

This article outlines the current state of network security in China, the government's strong emphasis on it, the legal framework, the necessity of incident response, detailed emergency‑response procedures, Ziru's own security program, and three illustrative case studies including Log4j2, a 2021 drill, and a FastJson vulnerability.

case studycybersecurityemergency planning
0 likes · 11 min read
Why Network Security Incident Response Matters: Strategies, Plans, and Real‑World Cases
MaGe Linux Operations
MaGe Linux Operations
Aug 4, 2022 · Information Security

Essential InfoSec FAQ: From White‑Hat Basics to Advanced Attack Techniques

This comprehensive FAQ explains key information‑security concepts, covering white‑hat hacking, IP vs MAC addresses, common penetration‑testing tools, hacker types, footprinting methods, brute‑force, DoS, SQL injection, sniffing, ARP spoofing, MAC flooding, rogue DHCP, XSS, Burp Suite, pharming, defacement, website protection, keyloggers, enumeration, NTP, MIB, password‑cracking techniques, attack stages, and CSRF mitigation.

cybersecurityhackinginformation security
0 likes · 10 min read
Essential InfoSec FAQ: From White‑Hat Basics to Advanced Attack Techniques
AntTech
AntTech
Aug 4, 2022 · Information Security

Ant Group's Full‑Graph Risk Control Architecture and Its Application in Combating Complex Fraud

The article presents Ant Group's full‑graph risk control system, detailing emerging fraud trends, the need for graph‑based anti‑fraud infrastructure, and the multi‑layer architecture that combines data cleaning, graph modeling, multi‑modal computation, and real‑time detection to tackle sophisticated, organized financial crimes.

anti‑money launderingfraud detectiongraph technology
0 likes · 11 min read
Ant Group's Full‑Graph Risk Control Architecture and Its Application in Combating Complex Fraud
DevOps
DevOps
Aug 3, 2022 · Information Security

Secure Design in DevSecOps: Principles, Threat Modeling, and Huawei Cloud Practices

This article explains how integrating secure‑by‑design principles into DevSecOps accelerates software delivery while reducing risk, outlines key security architecture concepts such as the CIA triad and design principles, describes threat‑modeling methods, and showcases Huawei Cloud’s practical security design, data protection, and privacy solutions.

DevSecOpsHuawei CloudSecure Design
0 likes · 12 min read
Secure Design in DevSecOps: Principles, Threat Modeling, and Huawei Cloud Practices
Open Source Linux
Open Source Linux
Aug 3, 2022 · Information Security

Unmasking a Fake GitHub Leak: From Weak Passwords to a Red Team Backdoor

During a penetration testing exercise, the team discovered a cleverly disguised GitHub repository that leaked credentials, leading to a vulnerable admin interface, a malicious Python‑based VPN client which, after reverse‑engineering with PyInstaller extraction, revealed embedded shellcode hidden in images, allowing the attackers to trace the command‑and‑control server and pinpoint the origin of the intrusion.

gitHub leakageinformation securitymalware analysis
0 likes · 7 min read
Unmasking a Fake GitHub Leak: From Weak Passwords to a Red Team Backdoor
AntTech
AntTech
Jul 29, 2022 · Information Security

Trusted Privacy Computing Research Report (2022): Definition, Core Elements, and Industry Outlook

The 2022 Trusted Privacy Computing Research Report, released by the Privacy Computing Alliance and Ant Group, defines trusted privacy computing, outlines its five core elements, discusses security verification methods, introduces the TECC technology, and highlights policy and market drivers shaping the data‑in‑cipher era.

Privacy ComputingTECCcryptography
0 likes · 11 min read
Trusted Privacy Computing Research Report (2022): Definition, Core Elements, and Industry Outlook
MaGe Linux Operations
MaGe Linux Operations
Jul 28, 2022 · Information Security

GoodWill Ransomware Forces Victims to Do Good Deeds – How It Works

GoodWill ransomware, discovered by CloudSEK in Mumbai, encrypts all files and demands victims complete three charitable acts and post a personal essay on social media before providing a decryption key, blending malware tactics with forced philanthropy while employing .NET, UPX packing, AES encryption, and location detection.

GoodWillcybersecurityinformation security
0 likes · 6 min read
GoodWill Ransomware Forces Victims to Do Good Deeds – How It Works
Architects Research Society
Architects Research Society
Jul 26, 2022 · Information Security

Data Governance: Securing the Data Lifecycle in Cloud Environments

This article explains how enterprises can implement data governance to protect data throughout its lifecycle—collection, storage, processing, and deletion—especially in public and hybrid cloud settings, outlining SABSA categories, key questions, and practical considerations for secure data management.

Data GovernanceSABSAcloud security
0 likes · 6 min read
Data Governance: Securing the Data Lifecycle in Cloud Environments
ITPUB
ITPUB
Jul 25, 2022 · Information Security

How 58.com Secured Its Business Data with the 金盾 SDK: A Full‑Cycle Testing Blueprint

This article details 58.com’s end‑to‑end approach to securing mobile, H5, and server SDKs—covering security fundamentals, the 5A methodology, the 金盾 architecture, integration steps, data‑flow encryption, comprehensive risk‑based testing, performance evaluation, and release decision making.

MobileSDKencryption
0 likes · 18 min read
How 58.com Secured Its Business Data with the 金盾 SDK: A Full‑Cycle Testing Blueprint
Programmer DD
Programmer DD
Jul 25, 2022 · Information Security

What the DHS CSRB Report Reveals About Log4j’s Ongoing Threat

Despite no major attacks yet, the DHS Cybersecurity Review Board’s latest report warns that the Log4j “nuclear‑level” vulnerability will likely be exploited for years, highlighting low current exploitation, indirect dependency risks, and urging academic cybersecurity training to strengthen future defenses.

CSRBLog4Shellcybersecurity
0 likes · 4 min read
What the DHS CSRB Report Reveals About Log4j’s Ongoing Threat
Laravel Tech Community
Laravel Tech Community
Jul 14, 2022 · Information Security

Understanding WeChat Chat Security, Encryption Mechanisms, and Potential Monitoring Risks

The article explains how WeChat aims to protect chat content through asymmetric key exchange and symmetric encryption, discusses why network monitoring alone cannot capture messages, and warns about other threats such as monitoring software, system vulnerabilities, and private‑key compromise that can expose communications.

WeChatchat securityinformation security
0 likes · 9 min read
Understanding WeChat Chat Security, Encryption Mechanisms, and Potential Monitoring Risks
Laravel Tech Community
Laravel Tech Community
Jul 11, 2022 · Information Security

OpenKylin: China’s Open Desktop Operating System Platform and Its Role in Information Security

The article introduces China’s newly launched OpenKylin desktop operating system developer platform, explains its open‑source community model, highlights the current landscape of domestic OSes, and underscores the security imperative of achieving autonomous control over core software amid foreign dominance.

ChinaDesktop OSOpenKylin
0 likes · 7 min read
OpenKylin: China’s Open Desktop Operating System Platform and Its Role in Information Security
dbaplus Community
dbaplus Community
Jul 2, 2022 · Information Security

How Top Banks Deploy DevSecOps to Strengthen Enterprise Security – Insights from a 2022 GDevOps Summit

The article summarizes Wei Yadong’s 2022 GDevOps Global Agile Operations Summit talk, covering the escalating threat landscape, financial industry security requirements, practical DevSecOps strategies, ICBC’s security transformation, and future trends such as security mesh, privacy‑enhancing computation, and decision intelligence.

DevSecOpsFinancial ServicesSecurity Operations
0 likes · 23 min read
How Top Banks Deploy DevSecOps to Strengthen Enterprise Security – Insights from a 2022 GDevOps Summit
Top Architect
Top Architect
Jun 29, 2022 · Information Security

Design and Implementation of a Token‑Based Authentication System Using OAuth2 and JWT

This article explains the need for a unified account management platform in enterprises, defines key authentication terms, compares session‑based and token‑based approaches, outlines a complete OAuth2 password‑grant flow with JWT tokens, and discusses technical choices, security features, and interface design for modern microservice architectures.

JWTOAuth2access control
0 likes · 8 min read
Design and Implementation of a Token‑Based Authentication System Using OAuth2 and JWT
MaGe Linux Operations
MaGe Linux Operations
Jun 26, 2022 · Information Security

How New US Export Controls Could Restrict Global Cybersecurity Collaboration

US BIS has finalized new export control rules that require entities collaborating with Chinese government‑linked organizations on cybersecurity projects to obtain prior approval, placing China in the restricted “D” category, while Microsoft opposes the measures, arguing they hinder legitimate vulnerability sharing and global security efforts.

BISExport controlsMicrosoft
0 likes · 7 min read
How New US Export Controls Could Restrict Global Cybersecurity Collaboration
Aikesheng Open Source Community
Aikesheng Open Source Community
Jun 23, 2022 · Information Security

SSL Overview and DBLE SSL Configuration Guide

This article introduces the SSL protocol, explains why encryption is needed for database communication, and provides step‑by‑step instructions for generating self‑signed certificates with OpenSSL, converting them for Java, and configuring both DBLE server and client to use SSL, including experimental verification of encrypted versus unencrypted connections.

DBLEOpenSSLSSL
0 likes · 15 min read
SSL Overview and DBLE SSL Configuration Guide
Programmer DD
Programmer DD
Jun 23, 2022 · Information Security

How to Build an Effective Security Awareness Training Program: A Six‑Step Guide

This article examines the Capital One breach case and outlines a comprehensive six‑step framework for enterprises to develop, implement, and continuously improve security awareness training, covering legal foundations, project planning, material preparation, execution scheduling, performance tracking, and post‑training optimization.

complianceinformation securityrisk management
0 likes · 7 min read
How to Build an Effective Security Awareness Training Program: A Six‑Step Guide
IT Architects Alliance
IT Architects Alliance
Jun 22, 2022 · Information Security

Secure RPC Encryption: Authentication, Anti‑Hijacking Design & Implementation

This article examines the challenges of securing API interfaces—including authentication for third‑party services and protection against request hijacking—and proposes a comprehensive RPC encryption framework that uses asymmetric and symmetric keys, signed payloads, and HTTPS fallback, detailing both client‑side and server‑side workflows, data structures, and providing links to the full source code.

API SecurityAuthenticationRPC encryption
0 likes · 5 min read
Secure RPC Encryption: Authentication, Anti‑Hijacking Design & Implementation
Efficient Ops
Efficient Ops
Jun 22, 2022 · Information Security

How ICBC Secures Its Software with DevSecOps: Practical Insights

This article explains how Industrial and Commercial Bank of China integrates security into its DevOps pipeline through DevSecOps, detailing challenges, toolchain implementation, CI/CD security measures, and ongoing plans to strengthen software security in a fast‑changing financial environment.

DevSecOpsautomationbanking IT
0 likes · 6 min read
How ICBC Secures Its Software with DevSecOps: Practical Insights
DataFunTalk
DataFunTalk
Jun 21, 2022 · Information Security

Trusted Traffic Governance and Anti‑Fraud Strategies Using Captcha

This talk explains how to use semantic-driven captcha mechanisms to classify and manage trusted versus untrusted traffic, detailing anti‑fraud strategies, flow identification, countermeasures against simulator and protocol cracking, and proactive updates to stay ahead of black‑market attacks.

CaptchaTraffic Classificationadversarial attacks
0 likes · 15 min read
Trusted Traffic Governance and Anti‑Fraud Strategies Using Captcha
Python Crawling & Data Mining
Python Crawling & Data Mining
Jun 21, 2022 · Information Security

Master Frida: Hook Android Apps with Advanced Techniques

This tutorial walks you through using Frida to hook Android applications, covering API basics, method interception, constructor and field manipulation, overload handling, dynamic class loading, and practical code snippets for both static and instance methods, all while emphasizing safe, educational use.

AndroidFridaHooking
0 likes · 19 min read
Master Frida: Hook Android Apps with Advanced Techniques
21CTO
21CTO
Jun 20, 2022 · Information Security

How an iCloud Hacker Stole Thousands of Nude Photos and Got 9 Years in Prison

A U.S. hacker known as "icloudripper4you" infiltrated thousands of iCloud accounts, stole massive amounts of nude photos and videos, and was sentenced to nine years in prison, highlighting the severe impact of cyber‑crime and the FBI's commitment to prosecuting such offenses.

cybercrimedata breachiCloud hack
0 likes · 4 min read
How an iCloud Hacker Stole Thousands of Nude Photos and Got 9 Years in Prison
NetEase Yanxuan Technology Product Team
NetEase Yanxuan Technology Product Team
Jun 13, 2022 · Information Security

How to Build a Robust Mobile App Security Framework: Threat Models, Detection, and Defense Strategies

This article examines the security challenges of mobile apps, outlines common threat scenarios such as flash‑sale abuse and fake device attacks, and proposes a layered detection‑and‑defense framework that combines app‑side identification, device fingerprinting, scenario verification, and cloud‑based policy enforcement.

Mobile SecurityThreat Detectionapp protection
0 likes · 20 min read
How to Build a Robust Mobile App Security Framework: Threat Models, Detection, and Defense Strategies
Top Architect
Top Architect
Jun 10, 2022 · Information Security

Understanding JWT Claims and Token Renewal Strategies

This article explains the standard JWT claims, demonstrates how to generate a token with custom claims in Java, and compares single‑token and double‑token renewal schemes, including practical steps for handling expiration, refresh logic, and Redis‑based token storage.

AuthenticationJWTbackend-development
0 likes · 8 min read
Understanding JWT Claims and Token Renewal Strategies
Architects' Tech Alliance
Architects' Tech Alliance
Jun 10, 2022 · Information Security

Understanding Firewalls: Principles, Architecture, and Functions

This article explains what a firewall is, how it isolates risk zones from safe zones, its working principles, the typical architecture involving screening routers and proxy servers, and the key security functions it provides for protecting network communications.

access controlfirewallinformation security
0 likes · 6 min read
Understanding Firewalls: Principles, Architecture, and Functions
MaGe Linux Operations
MaGe Linux Operations
Jun 8, 2022 · Information Security

164 Must‑Know Network Security Interview Questions (Full List)

This article provides two comprehensive collections of network security interview questions, totaling 164 real‑world questions that cover fundamentals such as SQL injection, XSS, CSRF, protocol basics, cryptography, penetration testing techniques, and incident response, helping candidates prepare effectively for technical interviews and increase their chances of landing high‑pay offers.

cybersecurityinformation securityinterview-questions
0 likes · 14 min read
164 Must‑Know Network Security Interview Questions (Full List)
21CTO
21CTO
May 31, 2022 · Information Security

What GitHub’s Latest Leak Reveals About Plaintext Credential Risks

GitHub’s recent security incident, unrelated to OAuth token attacks, exposed over 100,000 npm users' plaintext credentials and detailed private package data, prompting a review of logging practices, notification plans, and broader implications for supply‑chain security.

GitHubOAuthSecurity Breach
0 likes · 5 min read
What GitHub’s Latest Leak Reveals About Plaintext Credential Risks
AntTech
AntTech
May 30, 2022 · Information Security

Ant Group’s Technical Innovations: Green Computing, Trusted Mobile Anti‑Fraud Sandbox, Open‑Source Privacy Platform, OceanBase DB Competition, and Security Parallel Slice

This article highlights Ant Group’s recent technical achievements—including green carbon‑reduction scheduling, the AntDTX trusted privacy sandbox for mobile anti‑fraud, the open‑source YinYu privacy‑computing platform, the OceanBase database competition, and the Space5D security parallel‑slice architecture—showcasing their impact on sustainability, security, and open‑source collaboration.

Cloud NativePrivacy Computinganti-fraud
0 likes · 9 min read
Ant Group’s Technical Innovations: Green Computing, Trusted Mobile Anti‑Fraud Sandbox, Open‑Source Privacy Platform, OceanBase DB Competition, and Security Parallel Slice
DataFunSummit
DataFunSummit
May 24, 2022 · Information Security

Data Masking Techniques and Their Applications in Enterprise Data Security

This article explains the importance of data security under emerging privacy laws and provides a comprehensive overview of data masking concepts, common technical methods, typical enterprise scenarios—including static, database, and application-level masking—and strategic considerations for balancing business needs with privacy protection.

anonymizationdata maskinginformation security
0 likes · 12 min read
Data Masking Techniques and Their Applications in Enterprise Data Security
php Courses
php Courses
May 23, 2022 · Information Security

Implementing the SHA-256 Hash Algorithm in PHP from Scratch

This article explains the theory behind cryptographic hash functions and provides a complete PHP implementation of the SHA‑256 algorithm, detailing each processing step—from converting strings to binary to final compression—along with supporting helper functions and reference tables.

Binary OperationsSHA-256cryptography
0 likes · 19 min read
Implementing the SHA-256 Hash Algorithm in PHP from Scratch
Liangxu Linux
Liangxu Linux
May 22, 2022 · Information Security

Master firewalld: Zones, Services, Ports, Rich Rules & Direct Rules on Linux

This guide walks you through configuring firewalld on Linux, covering zones, temporary and permanent settings, service and port management, zone manipulation, rich rule creation, direct rule usage, and essential commands for enabling, disabling, and querying the firewall.

firewallfirewalldinformation security
0 likes · 15 min read
Master firewalld: Zones, Services, Ports, Rich Rules & Direct Rules on Linux
MaGe Linux Operations
MaGe Linux Operations
May 21, 2022 · Information Security

Test Your Cybersecurity Knowledge with 10 Quick Quiz Questions

This article presents ten multiple‑choice questions covering symmetric and asymmetric encryption, web malware, cookie security, access control, ARP spoofing, malicious code detection, buffer overflows, SQL injection, and rainbow‑table defenses, letting readers assess their information‑security expertise.

QuizWeb Securitycryptography
0 likes · 6 min read
Test Your Cybersecurity Knowledge with 10 Quick Quiz Questions
21CTO
21CTO
May 18, 2022 · Information Security

Why a Database Admin’s Data Deletion Led to a 7‑Year Prison Sentence

A former Lianjia database administrator was sentenced to seven years for deleting critical financial data, revealing how insider misuse of root privileges, inadequate security response, and ignored vulnerability reports can cripple a multi‑billion‑dollar enterprise, while similar incidents underscore the broader risks of insider threats.

Database Securitydata deletioninformation security
0 likes · 8 min read
Why a Database Admin’s Data Deletion Led to a 7‑Year Prison Sentence
Python Programming Learning Circle
Python Programming Learning Circle
May 16, 2022 · Information Security

How IP Geolocation Works and Its Privacy Implications

This article explains the technical principles behind IP‑based geolocation, describing how autonomous systems map IP addresses to approximate locations, the limits of accuracy, and the privacy concerns arising from both network operators and large‑scale data services.

Autonomous SystemIP geolocationinformation security
0 likes · 7 min read
How IP Geolocation Works and Its Privacy Implications
Weimob Technology Center
Weimob Technology Center
May 12, 2022 · Information Security

Securing Enterprise Data: Inside WKMS’s Scalable Key Management and Encryption Architecture

This article explains how WKMS addresses rising data‑protection regulations by offering a hierarchical key‑management service, masking SDK, AES‑based encryption, robust disaster‑recovery, and high‑throughput performance testing, illustrating a secure yet scalable solution for modern enterprises.

Cloud NativePerformance TestingSecurity Architecture
0 likes · 10 min read
Securing Enterprise Data: Inside WKMS’s Scalable Key Management and Encryption Architecture
IT Services Circle
IT Services Circle
May 8, 2022 · Information Security

An Introduction to Hashcat: Features, Usage, and Command Options

This article introduces Hashcat, the world’s fastest password‑recovery tool, outlines its extensive feature set, provides the project’s GitHub address, and explains how to download, install, and run basic commands with common options for various hash types and attack modes.

GPU AccelerationHashcatcommand-line
0 likes · 4 min read
An Introduction to Hashcat: Features, Usage, and Command Options