Tagged articles
3 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 6, 2026 · Information Security

Beyond Face Verification: Jinkusu Cam Triggers Trust Collapse in eKYC

The article dissects Jinkusu Cam, a real‑time deepfake and voice‑cloning tool that undermines eKYC facial verification, outlines its technical stack, highlights emerging fraud challenges, and proposes multi‑layered defensive strategies for financial institutions.

Jinkusu CamdeepfakeeKYC
0 likes · 11 min read
Beyond Face Verification: Jinkusu Cam Triggers Trust Collapse in eKYC
Laravel Tech Community
Laravel Tech Community
Feb 6, 2022 · Information Security

Understanding and Exploiting HTTP Host Header Attacks

This article explains the purpose of the HTTP Host header, how Host header attacks arise when the header is trusted or altered, demonstrates exploitation techniques such as modifying, duplicating, or injecting alternative header fields, and provides mitigation strategies to protect web applications.

Attack TechniquesHTTP Host headerSSRF
0 likes · 19 min read
Understanding and Exploiting HTTP Host Header Attacks
Meituan Technology Team
Meituan Technology Team
Mar 12, 2020 · Information Security

Cloud Native Security: Container Escape and Mitigation Strategies

Meituan's security team explains cloud‑native architecture, outlines container‑escape threats from kernel bugs, vulnerable runtimes and misconfigurations, and recommends mitigation through hardened kernels, secure‑container runtimes like gVisor or Kata, rigorous patch management, and collaborative feature development to strengthen runtime protection.

Container SecurityDockerKata Containers
0 likes · 20 min read
Cloud Native Security: Container Escape and Mitigation Strategies