Tagged articles
22 articles
Page 1 of 1
Black & White Path
Black & White Path
May 12, 2026 · Information Security

Automate Chinese Graded Protection Assessment with OpenOcta AI Skill on Kali

This guide shows how to install the open‑source OpenOcta AI Skill on Kali Linux, then use it to automate the four‑stage Chinese graded‑protection (等保) assessment—including information gathering, vulnerability scanning, exploit verification, and full compliance report generation—without manual configuration.

Kali LinuxOpenOctacompliance report
0 likes · 4 min read
Automate Chinese Graded Protection Assessment with OpenOcta AI Skill on Kali
Black & White Path
Black & White Path
Apr 21, 2026 · Information Security

Automated Android Penetration Test Command Generator: Parse AndroidManifest to Create Drozer Payloads

DrozerForge is a Python tool that parses an app's AndroidManifest.xml, automatically discovers security‑relevant components such as risky global settings, exported activities, deep‑link URLs, services/receivers, and content providers, and then prints ready‑to‑run Drozer commands for each finding.

AndroidAndroidManifestDrozer
0 likes · 11 min read
Automated Android Penetration Test Command Generator: Parse AndroidManifest to Create Drozer Payloads
Black & White Path
Black & White Path
Mar 26, 2026 · Information Security

ProjectDiscovery Unveils Neo: AI‑Driven Autonomous Penetration Testing Platform at RSAC 2026

At RSAC 2026, ProjectDiscovery launched Neo, an AI‑powered, end‑to‑end autonomous penetration testing platform that integrates 30+ security agents, delivers verifiable exploits, and outperformed traditional scanners by finding 66 vulnerabilities—including 24 unseen by any other tool—in three AI‑generated full‑stack applications.

AI securityBenchmarkNeo platform
0 likes · 6 min read
ProjectDiscovery Unveils Neo: AI‑Driven Autonomous Penetration Testing Platform at RSAC 2026
Black & White Path
Black & White Path
Feb 25, 2026 · Information Security

AI vs Human Hackers: Who Will Dominate Penetration Testing in 2026?

A joint study by Wiz and Irregular pits leading LLM agents against a senior pentester across ten real‑world vulnerability scenarios, revealing that AI can breach nine targets at under $10 per attack yet still lags in tool usage, creative reasoning, and prioritisation, offering crucial insights for security professionals.

AI securityhuman vs AIlarge language models
0 likes · 13 min read
AI vs Human Hackers: Who Will Dominate Penetration Testing in 2026?
Black & White Path
Black & White Path
Feb 23, 2026 · Information Security

PentAGI: AI‑Powered Penetration Testing Platform Integrates 20+ Tools to Redefine Security Assessments

PentAGI is an open‑source, AI‑driven penetration testing platform released by VXControl in early 2025 that automatically orchestrates over twenty security tools—including Nmap, Metasploit, sqlmap—and generates comprehensive reports within isolated Docker environments, offering advanced agent architecture, real‑time intelligence gathering, and scalable deployment options.

AI penetration testingDockerLLM
0 likes · 5 min read
PentAGI: AI‑Powered Penetration Testing Platform Integrates 20+ Tools to Redefine Security Assessments
AI Insight Log
AI Insight Log
Feb 20, 2026 · Artificial Intelligence

Claude Code Security Agent Launch Sparks Cybersecurity Stock Crash – What Next?

Anthropic’s limited‑preview Claude Code Security, an AI agent that reads and patches code, triggered a sharp sell‑off in major cybersecurity stocks, while its ability to uncover hundreds of hidden bugs raises questions about the future role of traditional security firms and junior analysts.

AI securityAnthropicClaude Code
0 likes · 7 min read
Claude Code Security Agent Launch Sparks Cybersecurity Stock Crash – What Next?
Bilibili Tech
Bilibili Tech
Nov 7, 2025 · Information Security

How AI-Driven Automation Transforms Security Alert Operations and Incident Tracing

This article explores the evolution of security alert automation from manual verification to SOAR and AI-driven solutions, detailing MCP-based AI agents, integration with various security tools, practical case studies of honey‑pot, HIDS, and EDR alert tracing, and the resulting efficiency gains and future outlook.

AIAlert AnalysisMCP
0 likes · 16 min read
How AI-Driven Automation Transforms Security Alert Operations and Incident Tracing
AntTech
AntTech
Sep 19, 2025 · Information Security

How Alipay Uses AI to Revolutionize Its Application Security Lifecycle

Since 2016, Alipay's security team has built the Alipay‑SDL 1.0 framework and now integrates AI and large‑model technologies to automate risk identification, enhance security tools, and streamline operations across the entire software development lifecycle, addressing rising business complexity and engineer workload.

AIApplication Securitymachine learning
0 likes · 15 min read
How Alipay Uses AI to Revolutionize Its Application Security Lifecycle
Qunar Tech Salon
Qunar Tech Salon
Jul 31, 2025 · Information Security

How Multi‑Agent AI Transforms SDLC White‑Box Vulnerability Management

An in‑depth exploration of a Multi‑Agent AI system that automates SDLC white‑box vulnerability management, detailing industry‑standard processes, the system’s architecture, specialized agents, prompt engineering, tool integration, and real‑world results that boost audit efficiency and accuracy while enabling true security left‑shift.

AISDLCVulnerability Management
0 likes · 24 min read
How Multi‑Agent AI Transforms SDLC White‑Box Vulnerability Management
Wukong Talks Architecture
Wukong Talks Architecture
May 14, 2025 · Information Security

AI-Powered CodeBuddy Uncovers and Fixes Real SQL Injection and XSS Bugs

This article walks through two real-world security flaws—a high‑risk SQL injection and a medium‑risk stored XSS—showing how the CodeBuddy AI assistant can automatically detect, analyze, and remediate them with prepared statements and CSP enhancements, while explaining the underlying concepts and best practices.

AI code reviewCodeBuddyContent Security Policy
0 likes · 13 min read
AI-Powered CodeBuddy Uncovers and Fixes Real SQL Injection and XSS Bugs
Efficient Ops
Efficient Ops
Jan 8, 2024 · Information Security

How a Securities Firm Built a 100‑Day DevSecOps Prototype

At the 21st GOPS Global Operations Conference in Shanghai, Shenwan Hongyuan Securities' application security lead Wang Biansi detailed a step‑by‑step 100‑day journey to create a DevSecOps sample room, covering goal setting, research, platform design, tool integration, and security training.

Application SecurityDevSecOpsOperations
0 likes · 5 min read
How a Securities Firm Built a 100‑Day DevSecOps Prototype
Efficient Ops
Efficient Ops
Jun 24, 2023 · Information Security

How ICBC Built a DevSecOps Security Framework to Accelerate Safe Software Delivery

This article explains how ICBC's software development center integrated DevSecOps practices—embedding security awareness, automating toolchains, and using metric‑driven assessments—to reduce vulnerabilities, lower compliance risk, and support a cloud‑native, secure smart‑banking ecosystem.

DevSecOpsinformation securitysecurity automation
0 likes · 8 min read
How ICBC Built a DevSecOps Security Framework to Accelerate Safe Software Delivery
Cloud Native Technology Community
Cloud Native Technology Community
Mar 21, 2023 · Information Security

2022 Cloud Native Security State Report: Key Findings on Cloud Expansion, Security Posture, and Drivers

The 2022 Cloud Native Security State Report reveals that while enterprises increased cloud usage by over 25% during the pandemic, many face security and compliance challenges, and highlights how strong security posture, DevSecOps integration, and automation dramatically reduce friction and boost operational efficiency.

Cloud NativeDevSecOpscloud adoption
0 likes · 6 min read
2022 Cloud Native Security State Report: Key Findings on Cloud Expansion, Security Posture, and Drivers
AntTech
AntTech
Nov 28, 2022 · Information Security

Ant Group Anti‑Intrusion Platform: Architecture, Trillion‑Scale Detection, Risk Assessment, and Automated Response

This article details the evolution, architecture, and key technologies of Ant Group's anti‑intrusion platform, explaining how it handles trillion‑level data streams for intrusion detection, performs multi‑dimensional risk assessment and attribution, and enables rapid, automated security incident response across massive enterprise environments.

anti-intrusioninformation securityintrusion detection
0 likes · 15 min read
Ant Group Anti‑Intrusion Platform: Architecture, Trillion‑Scale Detection, Risk Assessment, and Automated Response
Dada Group Technology
Dada Group Technology
Nov 28, 2022 · Information Security

Analyzing Java Template Engine Injection Vulnerabilities and Building Automated Detection Capabilities

This article examines injection vulnerabilities in Java template engines Velocity, FreeMarker, and Thymeleaf, details payload extraction, demonstrates how to generate automated detection rules and security operation capabilities, and discusses future directions for comprehensive attack‑chain analysis.

FreemarkerJavaThymeleaf
0 likes · 12 min read
Analyzing Java Template Engine Injection Vulnerabilities and Building Automated Detection Capabilities
iQIYI Technical Product Team
iQIYI Technical Product Team
Jan 8, 2021 · Information Security

SOAR (Security Orchestration, Automation and Response) Implementation at iQIYI: Architecture, Scenarios, and Roadmap

iQIYI’s SOAR platform, built on StackStorm and the Walkoff visual editor, integrates security components, scripts, chat‑ops bots, and a mini‑program to automate detection and response, cutting MTTR by roughly 75% across high‑frequency routine tasks and low‑frequency critical incidents while planning broader coverage and knowledge‑base expansion.

SOARSecurity OperationsStackStorm
0 likes · 8 min read
SOAR (Security Orchestration, Automation and Response) Implementation at iQIYI: Architecture, Scenarios, and Roadmap
DevOps
DevOps
Sep 7, 2020 · Information Security

OPPO’s DevSecOps Practice: Embedding Security and Privacy Across the Development Lifecycle

OPPO’s security team outlines its DevSecOps transformation, detailing how security and privacy activities are embedded across product lifecycles—from requirement reviews and automated CI/CD scans to comprehensive protection layers, cultural initiatives, external collaborations, and continuous improvement to meet global compliance challenges.

DevSecOpsOPPOci/cd
0 likes · 12 min read
OPPO’s DevSecOps Practice: Embedding Security and Privacy Across the Development Lifecycle
Efficient Ops
Efficient Ops
Jun 25, 2020 · Information Security

How Enterprise DevSecOps Transforms Security in Modern IT Operations

The article recaps the fourth Enterprise DevOps Empowerment conference, highlighting DevSecOps as the core theme, expert presentations from China Academy of Information and Communications Technology, Huatai Securities, and Tencent, and a detailed Q&A covering threat modeling, security automation, scanning practices, and operational integration.

IT OperationsThreat Modelingenterprise security
0 likes · 15 min read
How Enterprise DevSecOps Transforms Security in Modern IT Operations
DevOps
DevOps
Apr 21, 2020 · Information Security

Integrating SAST Tools into a DevSecOps Pipeline: Five Key Checkpoints and Best Practices

This article explains how to embed static application security testing (SAST) into a DevSecOps CI/CD pipeline by defining five essential checkpoints—pre‑commit, commit‑time, build‑time, test‑time, and deployment—covering purpose, benefits, handling false positives, result merging, custom rule sets, and automation strategies.

DevSecOpsSASTci/cd
0 likes · 20 min read
Integrating SAST Tools into a DevSecOps Pipeline: Five Key Checkpoints and Best Practices
DevOps Coach
DevOps Coach
Mar 27, 2018 · Operations

How IT Automation Will Transform Networks, Infrastructure, and Security in 2018

The article outlines how the 2018 automation wave is reshaping IT by accelerating network, infrastructure, cloud, and security processes, highlighting tools like Terraform, Ansible, SDN solutions, and DevSecOps practices, and urging organizations to adopt DevOps‑style automation to stay competitive.

DevOpsIT AutomationInfrastructure as Code
0 likes · 12 min read
How IT Automation Will Transform Networks, Infrastructure, and Security in 2018