Tagged articles
19 articles
Page 1 of 1
Black & White Path
Black & White Path
May 2, 2026 · Information Security

How I Uncovered High‑Risk Vulnerabilities in an SRC Asset

The author walks through a step‑by‑step vulnerability hunt on an SRC target, starting from a login page, fuzzing JavaScript APIs, exploiting weak passwords and missing authorisation, and ultimately exposing unauthorised video‑camera access and admin privileges.

API fuzzingSRClogic flaw
0 likes · 5 min read
How I Uncovered High‑Risk Vulnerabilities in an SRC Asset
Black & White Path
Black & White Path
Apr 28, 2026 · Information Security

Hackers Exploit React2Shell via Telegram Bot, Breaching Over 900 Companies

A publicly exposed server revealed a large‑scale automated attack in which threat actors used the Bissa scanner tool, AI‑assisted code, and hard‑coded Telegram bots to exploit the React2Shell (CVE‑2025‑55182) vulnerability, stealing credentials from more than 900 enterprises and reporting each success in real time.

AutomationBissa scannerCVE-2025-55182
0 likes · 7 min read
Hackers Exploit React2Shell via Telegram Bot, Breaching Over 900 Companies
Black & White Path
Black & White Path
Apr 27, 2026 · Information Security

Self‑Built QPU Stack Claims to Factor RSA‑1024: What the Analysis Shows

Renowned cryptographer Jean‑Philippe Aumasson posted a self‑built QPU stack that allegedly factors RSA‑1024, but a detailed technical review reveals the code relies on classic algorithms, the video is merely an animation, and the claim serves as a warning for organizations still using RSA‑1024.

QPUQuantum ComputingRSA-1024
0 likes · 10 min read
Self‑Built QPU Stack Claims to Factor RSA‑1024: What the Analysis Shows
Black & White Path
Black & White Path
Apr 14, 2026 · Information Security

How LinkedIn Leverages 6,236 Browser Fingerprints to Reveal Your Career Secrets in Milliseconds

A detailed security analysis shows that LinkedIn's browser extension silently runs a heavily obfuscated JavaScript payload that probes over 6,200 Chrome extensions in a few milliseconds, building precise user profiles, political tags, and commercial intelligence, while Microsoft defends the practice as anti‑scraping.

Browser FingerprintingChrome ExtensionExtremeHack
0 likes · 9 min read
How LinkedIn Leverages 6,236 Browser Fingerprints to Reveal Your Career Secrets in Milliseconds
Black & White Path
Black & White Path
Apr 13, 2026 · Information Security

Cracking a “Fortress” OAuth redirect_uri: A Deep Technical Dive

The article dissects a custom OAuth implementation in a major automotive company's identity system, explains why the redirect_uri is the critical attack surface, and details how systematic fuzzing and a double‑encoding payload ultimately bypass the strict URL validation to hijack user accounts.

OAuthURL fuzzingauthentication vulnerability
0 likes · 13 min read
Cracking a “Fortress” OAuth redirect_uri: A Deep Technical Dive
Wukong Talks Architecture
Wukong Talks Architecture
Mar 31, 2026 · Industry Insights

What the Claude Code Source Map Leak Reveals About AI Tool Security and Competition

A recent open‑source mishap exposed the entire TypeScript codebase of Anthropic’s Claude Code CLI via an oversized source‑map file, revealing internal APIs, telemetry, encryption modules and unreleased features, sparking community analysis, security concerns, and competitive ripples in the AI‑coding tool market.

AI programming toolsAnthropicClaude Code
0 likes · 7 min read
What the Claude Code Source Map Leak Reveals About AI Tool Security and Competition
AI Programming Lab
AI Programming Lab
Mar 31, 2026 · Information Security

Claude Code Source Leak Exposes 1,906 Files – Inside the Security Mishap

A recent GitHub repository revealed the Claude Code CLI source map, unintentionally publishing a 60 MB file that reconstructed the full TypeScript codebase, exposing 1,906 files and over 512,000 lines, and prompting a detailed security and engineering analysis of the tool’s architecture, feature flags, and bugs.

BunCLIClaude Code
0 likes · 9 min read
Claude Code Source Leak Exposes 1,906 Files – Inside the Security Mishap
Black & White Path
Black & White Path
Feb 10, 2026 · Artificial Intelligence

Claude Opus 4.6 Finds 500 Zero‑Day Bugs Out‑of‑the‑Box, Redefining Code Audits

Anthropic’s Claude Opus 4.6 not only shattered AI benchmarks in coding, reasoning and search, but also, when sandboxed with standard fuzzers and debuggers, autonomously uncovered over 500 high‑severity zero‑day vulnerabilities—including a GhostScript crash and buffer‑overflow bugs—prompting a market sell‑off and raising both excitement and misuse concerns.

AI code auditAnthropicBenchmark
0 likes · 5 min read
Claude Opus 4.6 Finds 500 Zero‑Day Bugs Out‑of‑the‑Box, Redefining Code Audits
Tech Musings
Tech Musings
Nov 30, 2025 · Information Security

Uncovering Bot Traffic: Why AI Crawlers Dominate 47% of My Site’s Visits

A comprehensive analysis of a year‑long Nginx log dataset reveals that nearly half of all requests come from bots—especially AI crawlers—while real users account for less than half, highlighting security threats, attack patterns, and the effectiveness of blacklist defenses across monthly, daily, and hourly dimensions.

AI crawlersbot trafficsecurity analysis
0 likes · 21 min read
Uncovering Bot Traffic: Why AI Crawlers Dominate 47% of My Site’s Visits
Deepin Linux
Deepin Linux
Aug 24, 2025 · Information Security

How PacketScope Uses eBPF to Visualize and Secure TCP/IP Protocol Interactions

PacketScope leverages eBPF to provide a real-time, kernel-level visualization of TCP/IP protocol interactions, enabling detailed security analysis, performance diagnostics, and zero-delay defense, while offering installation guides and a UI that highlights packet analysis, function call chains, and cross-layer metrics.

eBPFnetwork tracingprotocol interaction
0 likes · 12 min read
How PacketScope Uses eBPF to Visualize and Secure TCP/IP Protocol Interactions
Architect
Architect
Aug 21, 2024 · Industry Insights

How Dark Apps Launder Money Through Phone and Electricity Top‑Ups

The article analyzes a hidden money‑laundering ecosystem where shady mobile apps use phone‑bill and electricity‑bill recharge interfaces, various QR‑code transfers, and intermediary shops to disguise illicit funds, detailing the process, payment methods, server traces, and the challenges of dismantling the network.

black marketindustry insightmoney laundering
0 likes · 9 min read
How Dark Apps Launder Money Through Phone and Electricity Top‑Ups
360 Smart Cloud
360 Smart Cloud
Feb 9, 2021 · Information Security

Using DNS for Network Measurement and Security Analysis

This article explains how DNS, the Internet's core naming protocol, can be leveraged for large‑scale network measurement and security analysis, covering DNS hijacking metrics, NTP pool observations, passive DNS techniques, and the DNSMon threat‑detection system with practical insights and references.

DNSData AnalyticsThreat Detection
0 likes · 12 min read
Using DNS for Network Measurement and Security Analysis
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Dec 23, 2020 · Information Security

Unlocking DNS: Measuring Networks and Detecting Threats with Data

This article explains how DNS data can be leveraged for both network measurement—such as quantifying global DNS hijacking and analyzing NTP pool servers—and security analysis, including threat detection with systems like DNSMon, highlighting the protocol’s growing importance for privacy, performance, and threat intelligence.

DNSNTP poolThreat Detection
0 likes · 11 min read
Unlocking DNS: Measuring Networks and Detecting Threats with Data
360 Tech Engineering
360 Tech Engineering
Dec 22, 2020 · Information Security

Using DNS for Network Measurement and Security Analysis

This article presents a comprehensive overview of DNS-based network measurement and security analysis, covering DNS fundamentals, hijacking metrics, NTP pool studies, passive DNS applications, and the DNSMon threat‑detection system, highlighting methods, findings, and practical implications for internet security.

DNSData AnalyticsThreat Detection
0 likes · 12 min read
Using DNS for Network Measurement and Security Analysis
Efficient Ops
Efficient Ops
Aug 17, 2020 · Information Security

How to Analyze and Reproduce an Nginx Backdoor: Step‑by‑Step Guide

This article walks through the discovery, reverse‑engineering, and full reproduction of a malicious Nginx backdoor, detailing its cookie‑based trigger, shell‑reversal mechanism, code analysis, compilation steps, and detection methods for security researchers.

backdoorreverse engineeringreverse shell
0 likes · 9 min read
How to Analyze and Reproduce an Nginx Backdoor: Step‑by‑Step Guide
360 Tech Engineering
360 Tech Engineering
Jun 14, 2019 · Information Security

A Guide to Producing Threat Intelligence from a Security Analysis Perspective

This article explains how threat intelligence is generated by defining it as judged security information, outlines methods for collecting and evaluating security data, introduces a two‑dimensional reliability/quality rating system, and provides a step‑by‑step engineering workflow for enterprise threat‑intelligence operations.

information collectionmachine learningrisk assessment
0 likes · 10 min read
A Guide to Producing Threat Intelligence from a Security Analysis Perspective
MaGe Linux Operations
MaGe Linux Operations
Mar 24, 2017 · Information Security

How We Detected and Eliminated a Struts2 Mining Malware Attack

This article recounts a recent incident where a Struts2 vulnerability was exploited to run mining malware, detailing the discovery process, forensic analysis of services, processes, network listeners, and the step‑by‑step remediation measures including script‑based scans, permission hardening, and upgrading Struts2.

Struts2Vulnerabilityincident response
0 likes · 4 min read
How We Detected and Eliminated a Struts2 Mining Malware Attack
WeChat Backend Team
WeChat Backend Team
Dec 12, 2016 · Information Security

TLS Security Deep Dive: Threat Models, Handshakes & Best Practices

This article provides a comprehensive security analysis of the TLS protocol, covering attacker models, authentication and key exchange mechanisms, version rollback attacks, handshake vulnerabilities, session resumption, application data protection, explicit IV concerns, DoS threats, session ticket security, TLS extensions, PKI considerations, historical flaws, and the major improvements introduced in TLS 1.3.

TLSTLS 1.3cryptography
0 likes · 30 min read
TLS Security Deep Dive: Threat Models, Handshakes & Best Practices