Tagged articles
7 articles
Page 1 of 1
Black & White Path
Black & White Path
Feb 26, 2026 · Information Security

How AI Enabled a Non‑Expert to Breach 6,700 DJI Vacuums and 600 Firewalls Worldwide

A non‑professional using Claude Code exploited a cloud‑permission flaw in DJI Romo robots to control 6,700 devices across 24 countries, while a separate AI‑driven campaign compromised over 600 Fortinet firewalls in 55 nations, illustrating how generative AI is dramatically lowering the barrier to large‑scale cyber attacks.

AIDJIVulnerability
0 likes · 13 min read
How AI Enabled a Non‑Expert to Breach 6,700 DJI Vacuums and 600 Firewalls Worldwide
Efficient Ops
Efficient Ops
May 27, 2025 · Information Security

How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm

Guangzhou police investigated a foreign cyber‑attack on a local tech firm, traced the malicious code to a Taiwan‑based hacker group linked to the DPP, and detailed the group’s low‑level tactics, extensive asset scanning, and use of VPNs and overseas cloud servers.

Taiwan hacker groupcybersecurityhacker attribution
0 likes · 4 min read
How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm
Efficient Ops
Efficient Ops
May 20, 2025 · Information Security

How an Overseas Hacker Group Disrupted a Guangzhou Tech Company's Services

A coordinated overseas cyber‑attack breached a Guangzhou tech firm's self‑service equipment backend, causing hours of service outage, data leakage, and significant losses, prompting swift police investigation, evidence preservation, and a detailed technical analysis of the attackers' methods.

Chinacybersecurityhacker group
0 likes · 4 min read
How an Overseas Hacker Group Disrupted a Guangzhou Tech Company's Services
Tencent Cloud Developer
Tencent Cloud Developer
May 14, 2018 · Information Security

Analysis of a Hybrid DDoS Attack Leveraging TCP Reflection on Cloud Gaming Services

Tencent Cloud mitigated a 31‑minute, 194 Gbps hybrid DDoS attack on a cloud gaming service that combined typical SYN/ICMP floods with a rare TCP‑reflection component sending spoofed SYN/ACK packets to common service ports, primarily from Chinese IDC servers, prompting advanced filtering and cloud‑based mitigation recommendations.

DDoSGamingTCP reflection
0 likes · 10 min read
Analysis of a Hybrid DDoS Attack Leveraging TCP Reflection on Cloud Gaming Services
21CTO
21CTO
Oct 1, 2015 · Information Security

Why DDoS Attacks Still Threaten Everyone and How to Respond Quickly

This article explains what DDoS attacks are, highlights famous large‑scale incidents, examines their financial and reputational impact on businesses, and outlines practical mitigation strategies that cloud providers and organizations can adopt to detect and survive such attacks.

DDoSDistributed Denial of ServiceMitigation
0 likes · 7 min read
Why DDoS Attacks Still Threaten Everyone and How to Respond Quickly