Tagged articles
31 articles
Page 1 of 1
Black & White Path
Black & White Path
May 6, 2026 · Information Security

Inside RegPwn (CVE‑2026‑24291): How a Simple Lock‑Screen Race Condition Grants SYSTEM Access

CVE‑2026‑24291, dubbed RegPwn, exploits a race condition in the Windows ATConfig mechanism that lets a standard user create a registry symbolic link, trigger a lock‑screen transition, and silently elevate to SYSTEM, affecting multiple Windows 10, 11, and Server releases until patched in March 2026.

ATBrokerCVE-2026-24291Detection
0 likes · 15 min read
Inside RegPwn (CVE‑2026‑24291): How a Simple Lock‑Screen Race Condition Grants SYSTEM Access
Black & White Path
Black & White Path
May 1, 2026 · Information Security

Deep Dive into cPanel/WHM Auth Bypass Vulnerability (CVE‑2026‑41940)

watchTowr Labs discovered a critical authentication bypass in all supported cPanel & WHM versions (CVE‑2026‑41940) that allows remote attackers to inject session files via crafted HTTP requests, gain root access, and has been observed in the wild; the article details the flaw, exploitation chain, impact, and mitigation steps.

Authentication BypassCVE-2026-41940Mitigation
0 likes · 13 min read
Deep Dive into cPanel/WHM Auth Bypass Vulnerability (CVE‑2026‑41940)
Machine Heart
Machine Heart
Apr 23, 2026 · Artificial Intelligence

First Survey of Attention Sink: From Utilization and Understanding to Elimination in Transformers

This survey reviews over 180 papers on the Attention Sink phenomenon in Transformers, outlining its three-stage evolution—from early exploitation to mechanistic interpretation and finally strategic mitigation—while detailing utilization tactics, theoretical explanations, removal techniques, and promising future research directions.

Attention SinkMitigationTransformers
0 likes · 9 min read
First Survey of Attention Sink: From Utilization and Understanding to Elimination in Transformers
Black & White Path
Black & White Path
Apr 3, 2026 · Information Security

Chrome’s New High‑Severity 0‑Day: CVE‑2026‑5281 Exploited in the Wild

Google released an emergency update on April 1 2026 fixing a critical Use‑After‑Free vulnerability (CVE‑2026‑5281) in Chrome’s WebGPU Dawn component, which is already exploited in the wild; the article details the flaw’s mechanics, attack flow, affected versions, exploitation challenges, and mitigation recommendations.

CVE-2026-5281ChromeDawn
0 likes · 16 min read
Chrome’s New High‑Severity 0‑Day: CVE‑2026‑5281 Exploited in the Wild
Machine Learning Algorithms & Natural Language Processing
Machine Learning Algorithms & Natural Language Processing
Mar 17, 2026 · Artificial Intelligence

80 Million Records Expose AI‑Generated Data Pollution Undermining Diagnostic Reliability

A large‑scale study of over 800,000 synthetic clinical records shows that self‑training loops of AI‑generated medical text, reports, and images cause severe loss of pathological diversity, vocabulary, and diagnostic confidence, prompting the authors to propose mixed‑real‑data training and quality‑aware filtering as mitigations.

AIDiagnostic reliabilityMitigation
0 likes · 10 min read
80 Million Records Expose AI‑Generated Data Pollution Undermining Diagnostic Reliability
Java Architect Essentials
Java Architect Essentials
Aug 24, 2025 · Information Security

How Java Serialization Leaks Passwords—and the Simple Fix with transient

This article explains how Java’s native serialization can expose plain‑text passwords, illustrates real‑world breaches, and shows how using the transient keyword together with encryption, library replacement, security frameworks, and penetration testing creates a five‑layer defense against serialization attacks.

MitigationVulnerabilityjava
0 likes · 6 min read
How Java Serialization Leaks Passwords—and the Simple Fix with transient
Java Tech Enthusiast
Java Tech Enthusiast
May 9, 2025 · Information Security

Understanding and Preventing HTTP Redirect Attacks in Java Applications

After a login module unintentionally redirected users to a gambling site, the author explains how maliciously crafted redirect parameters enable HTTP redirect attacks, demonstrates vulnerable Java code, and outlines three defensive layers—whitelisting, signature verification, and path sanitization—plus five best‑practice tips to prevent such exploits.

HTTP redirectMitigationOpen Redirect
0 likes · 7 min read
Understanding and Preventing HTTP Redirect Attacks in Java Applications
DevOps Coach
DevOps Coach
Jun 30, 2024 · Operations

Effective Incident Mitigation and Recovery: Practical SRE Strategies

The article outlines SRE‑based incident mitigation and recovery practices, covering urgent mitigations, impact reduction, key metrics such as TTD, TTR, TBF, and detailed strategies for shortening detection and repair times, preventing fatigue, improving observability, and designing resilient systems.

MitigationOperationsReliability
0 likes · 23 min read
Effective Incident Mitigation and Recovery: Practical SRE Strategies
Baobao Algorithm Notes
Baobao Algorithm Notes
Aug 22, 2023 · Artificial Intelligence

Why Do Large Language Models Hallucinate? Definitions, Causes, and Mitigation Strategies

This article defines hallucination in LLMs as a failure of faithfulness or factualness, explores data‑level and model‑level origins, reviews reference‑based and reference‑free evaluation metrics, and surveys current research on data‑centric and model‑centric mitigation techniques along with future directions.

Mitigationevaluationfactuality
0 likes · 16 min read
Why Do Large Language Models Hallucinate? Definitions, Causes, and Mitigation Strategies
php Courses
php Courses
Aug 6, 2023 · Information Security

Common Web Attack Types and Their Mitigation Strategies

This article outlines the most common web attacks—including DDoS, XSS, SQL injection, and CSRF—explains how they compromise website security, and provides practical mitigation techniques such as traffic filtering, input validation, parameterized queries, CSRF tokens, and secure configuration to protect sites and user data.

CSRFDDoSMitigation
0 likes · 10 min read
Common Web Attack Types and Their Mitigation Strategies
Java Architecture Diary
Java Architecture Diary
Mar 22, 2023 · Information Security

Understanding Spring Framework DoS Vulnerability CVE-2023-20861 and How to Fix It

This article explains the Spring Framework DoS vulnerability (CVE‑2023‑20861), outlines affected versions, details the root cause in SpEL expression handling, and provides step‑by‑step mitigation and upgrade instructions for both Spring Framework and Spring Boot, along with references and security considerations.

CVE-2023-20861DoSMitigation
0 likes · 7 min read
Understanding Spring Framework DoS Vulnerability CVE-2023-20861 and How to Fix It
MaGe Linux Operations
MaGe Linux Operations
Feb 25, 2023 · Information Security

Top 10 Website Security Threats & How to Defend Your Site

This article examines the ten most common website security attacks—from XSS and SQL injection to DDoS and phishing—explaining their motivations, mechanisms, and practical mitigation strategies such as WAF deployment, input sanitization, SSL encryption, and regular updates to help protect any online presence.

DDoSInformation SecurityMitigation
0 likes · 14 min read
Top 10 Website Security Threats & How to Defend Your Site
OPPO Amber Lab
OPPO Amber Lab
May 20, 2022 · Information Security

How Intent Redirection Lets Malicious Android Apps Gain System Privileges

This article analyzes a high‑risk Android Intent‑redirection vulnerability discovered in a smart‑terminal app, explains how attackers can gain system privileges to launch arbitrary activities, and outlines concrete mitigation steps for developers and security professionals.

AndroidIntent RedirectionMitigation
0 likes · 8 min read
How Intent Redirection Lets Malicious Android Apps Gain System Privileges
Architecture Digest
Architecture Digest
Dec 21, 2021 · Information Security

Apache Log4j2 Remote Code Execution Vulnerability Exploitation Guide

This article introduces Apache Log4j2, explains the remote code execution vulnerability caused by unsafe JNDI lookups, provides step‑by‑step environment setup, PoC code, exploitation instructions, and outlines official patches and temporary mitigation measures for developers and security engineers.

ExploitMitigationRemote Code Execution
0 likes · 5 min read
Apache Log4j2 Remote Code Execution Vulnerability Exploitation Guide
JD Cloud Developers
JD Cloud Developers
Dec 16, 2021 · Information Security

Detect and Mitigate the Log4j2 Remote Code Execution Flaw with JD Cloud Tools

This article explains the critical Log4j2 remote code execution vulnerability, offers JD Cloud's free online scanning service, details rapid defense measures using Web Application Firewall and Starshield, and provides step‑by‑step mitigation and upgrade recommendations to protect Java applications.

MitigationVulnerabilityWeb Application Firewall
0 likes · 6 min read
Detect and Mitigate the Log4j2 Remote Code Execution Flaw with JD Cloud Tools
Laravel Tech Community
Laravel Tech Community
Dec 13, 2021 · Information Security

Apache Log4j2 Remote Code Execution Vulnerability: Description, Impact, and Mitigation Steps

On December 10, a critical remote code execution vulnerability in Apache Log4j 2.x (≤ 2.14.1) was disclosed, allowing attackers to execute arbitrary code via JNDI injection; the article explains the flaw, affected components, detection methods, and urgent remediation measures such as disabling lookups and upgrading to safe versions.

JNDI injectionMitigationRemote Code Execution
0 likes · 5 min read
Apache Log4j2 Remote Code Execution Vulnerability: Description, Impact, and Mitigation Steps
Java Architect Essentials
Java Architect Essentials
Dec 10, 2021 · Information Security

Mitigating the Critical Apache Log4j2 Vulnerability (CVE‑2021‑44228)

The article explains the severe Log4j2 remote‑code‑execution vulnerability affecting versions 2.0 to 2.14.1, provides the official patch link, and lists practical temporary mitigation steps such as JVM flags, configuration changes, environment variables, and network isolation to protect Java applications.

CVE-2021-44228MitigationSecurity Patch
0 likes · 3 min read
Mitigating the Critical Apache Log4j2 Vulnerability (CVE‑2021‑44228)
Top Architect
Top Architect
Dec 10, 2021 · Information Security

Log4j 2 Vulnerability Overview and Mitigation Measures

The article explains the Log4j 2 remote code execution vulnerability affecting versions up to 2.14.1, describes its impact, lists affected components, and provides both permanent upgrade instructions and urgent mitigation steps such as JVM flags, configuration changes, and environment variable settings.

MitigationRemote Code ExecutionSecurity Patch
0 likes · 3 min read
Log4j 2 Vulnerability Overview and Mitigation Measures
Laravel Tech Community
Laravel Tech Community
Oct 10, 2021 · Information Security

Common PHP Security Vulnerabilities and Mitigation Strategies

This article outlines ten common PHP security threats—including SQL injection, XSS, CSRF, LFI, weak password hashing, MITM, command injection, XXE, improper error reporting, and login rate limiting—explaining how each attack works and providing practical mitigation techniques such as prepared statements, input sanitization, CSRF tokens, and HTTPS.

MitigationPHPWeb
0 likes · 15 min read
Common PHP Security Vulnerabilities and Mitigation Strategies
Tencent Cloud Developer
Tencent Cloud Developer
Oct 12, 2020 · Information Security

Understanding DDoS Attacks: Principles, Case Studies, and Protection Solutions

The article explains DDoS attack fundamentals, illustrates escalating real‑world incidents and their mitigation, and compares Tencent Cloud’s free, high‑defense package, and high‑defense IP solutions, guiding readers on selecting appropriate protection based on attack history, bandwidth needs, and budget constraints.

Cloud ProtectionDDoSDistributed Denial of Service
0 likes · 9 min read
Understanding DDoS Attacks: Principles, Case Studies, and Protection Solutions
Architects Research Society
Architects Research Society
Jul 8, 2020 · Information Security

Top 25 Software Errors (CWE) and Resources for Mitigation

The article presents the CWE Top 25 software errors, detailing each weakness with its ID and description, and provides links to MITRE entries, remediation guidance, and various SANS training resources aimed at helping developers mitigate these common vulnerabilities.

CWEMitigationSANS
0 likes · 17 min read
Top 25 Software Errors (CWE) and Resources for Mitigation
Tencent Cloud Developer
Tencent Cloud Developer
Jul 4, 2018 · Information Security

2018 H1 Gaming Industry DDoS Attack Landscape and Mitigation Recommendations

In the first half of 2018, the gaming industry faced a dramatic rise in DDoS attacks—accounting for nearly 40% of incidents and reaching a 1.23 Tbps peak on Tencent Cloud—driven largely by UDP‑based and MEMCACHED reflection floods, prompting comprehensive mitigation strategies such as BGP high‑defense, traffic filtering, and industry‑specific protections.

Attack TrendsDDoSGaming Industry
0 likes · 15 min read
2018 H1 Gaming Industry DDoS Attack Landscape and Mitigation Recommendations
360 Quality & Efficiency
360 Quality & Efficiency
Jan 22, 2018 · Information Security

High‑Risk Android WebView Cross‑Origin Access Vulnerability – Description, Impact, Detection, and Mitigation

A security bulletin released on January 9 2018 details a critical Android WebView cross‑origin vulnerability that can expose user privacy data and credentials, outlines its widespread impact on many apps, and provides detection tools and concrete remediation steps for developers.

AndroidCross-OriginInformation Security
0 likes · 4 min read
High‑Risk Android WebView Cross‑Origin Access Vulnerability – Description, Impact, Detection, and Mitigation
Ctrip Technology
Ctrip Technology
Nov 1, 2016 · Information Security

Understanding Serialization, Deserialization Vulnerabilities and Mitigation in Java

The article explains Java serialization and deserialization concepts, provides sample code for serializing a string to a file and restoring it, describes how insecure deserialization leads to remote code execution vulnerabilities illustrated by ActiveMQ, JBoss and Jenkins cases, and outlines mitigation techniques such as class whitelisting, encryption, and using transient fields.

DeserializationMitigationVulnerability
0 likes · 7 min read
Understanding Serialization, Deserialization Vulnerabilities and Mitigation in Java
21CTO
21CTO
Oct 1, 2015 · Information Security

Why DDoS Attacks Still Threaten Everyone and How to Respond Quickly

This article explains what DDoS attacks are, highlights famous large‑scale incidents, examines their financial and reputational impact on businesses, and outlines practical mitigation strategies that cloud providers and organizations can adopt to detect and survive such attacks.

DDoSDistributed Denial of ServiceMitigation
0 likes · 7 min read
Why DDoS Attacks Still Threaten Everyone and How to Respond Quickly
Architect
Architect
Jul 3, 2015 · Information Security

Evolution of DDoS Attacks and Mitigation Strategies

The article outlines the evolution of DDoS attacks from early botnet‑based floods to reflection attacks leveraging open servers and finally IoT‑device protocols like SSDP, explains their amplification mechanisms, presents statistical trends, and discusses comprehensive mitigation techniques including source verification, traffic shaping, ISP cooperation, CDN protection, and big‑data analytics.

BotnetDDoSIoT
0 likes · 11 min read
Evolution of DDoS Attacks and Mitigation Strategies