Tagged articles
2 articles
Page 1 of 1
OPPO Amber Lab
OPPO Amber Lab
Nov 22, 2022 · Information Security

Key Takeaways from the 2022 XDef‑OPPO Security Salon Chengdu – Advanced Threat Defense

The 2022 XDef‑OPPO Security Salon in Chengdu gathered industry experts to discuss system‑level 3D defense, DOS attacks on data storage, Bluetooth memory flaws, cross‑device information flow, and Android hybrid security, offering deep insights and practical solutions for modern endpoint protection.

Android SecurityBluetooth VulnerabilityConference Summary
0 likes · 6 min read
Key Takeaways from the 2022 XDef‑OPPO Security Salon Chengdu – Advanced Threat Defense
Architects' Tech Alliance
Architects' Tech Alliance
May 15, 2017 · Information Security

Ransomware Defense: Attack Vectors, C2 Communication, Defensive Chain, and Enterprise Security Gaps

This article provides an in‑depth analysis of ransomware, detailing its typical propagation methods, common intrusion techniques, C2 communication behaviors, the defensive chain across reconnaissance, deployment and persistence stages, and highlights current enterprise security gaps and comprehensive protection strategies.

C2 communicationThreat Defenseenterprise security
0 likes · 13 min read
Ransomware Defense: Attack Vectors, C2 Communication, Defensive Chain, and Enterprise Security Gaps