Tagged articles
21 articles
Page 1 of 1
Black & White Path
Black & White Path
Mar 24, 2026 · Information Security

RSAC 2026: How AI Has Split Cybersecurity into Two Parallel Wars

At RSAC 2026, analysts warned that AI is reshaping cybersecurity into two simultaneous battles—rebuilding defenses with AI and protecting AI systems themselves—while attack timelines have collapsed from nine days to thirty minutes, forcing defenders to rethink SOC operations, architecture, and readiness.

AIAI-native ArchitectureRSAC 2026
0 likes · 14 min read
RSAC 2026: How AI Has Split Cybersecurity into Two Parallel Wars
Black & White Path
Black & White Path
Mar 21, 2026 · Information Security

GhostClaw/GhostLoader Malware Deep Dive: GitHub Repo and AI Workflow Attacks on macOS

The report details how the GhostClaw/GhostLoader campaign leverages trusted GitHub repositories and AI‑assisted development workflows to deliver a multi‑stage macOS payload that steals credentials, contacts a single C2 domain, and establishes persistence, while providing blue‑team detection and mitigation guidance.

AI workflowGitHubThreat Detection
0 likes · 18 min read
GhostClaw/GhostLoader Malware Deep Dive: GitHub Repo and AI Workflow Attacks on macOS
AntTech
AntTech
Jun 6, 2025 · Information Security

How Ant Group’s Aspect‑Fusion AI Boosts Threat Detection and Reduces False Alarms

Ant Group’s “Aspect‑Fusion Intelligence” system, recognized as an outstanding cybersecurity case at the 2025 Beijing Cybersecurity Conference, leverages large‑model AI and expert knowledge to enhance threat detection, lower false positives, and improve explainability in large‑scale intrusion detection.

AIAnt GroupCase Study
0 likes · 4 min read
How Ant Group’s Aspect‑Fusion AI Boosts Threat Detection and Reduces False Alarms
AntTech
AntTech
Apr 24, 2025 · Artificial Intelligence

Ant Group Presents AI‑Driven Threat Detection Using Parallel Security Slices at the 2nd Wuhan Cybersecurity Innovation Forum

At the second Wuhan Cybersecurity Innovation Forum, Ant Group unveiled its AI‑powered "parallel security slice" approach for threat detection, detailing a multi‑layer defense system that leverages a DKCF framework, large‑model reasoning, and knowledge graphs to improve accuracy, reduce false alarms, and uncover unknown threats in complex digital enterprises.

AIAnt GroupDKCF
0 likes · 4 min read
Ant Group Presents AI‑Driven Threat Detection Using Parallel Security Slices at the 2nd Wuhan Cybersecurity Innovation Forum
AntTech
AntTech
Jun 21, 2024 · Artificial Intelligence

Ant Group’s Security Parallel Aspect Fusion AI: A Case Study Selected at the 2024 World Intelligent Industry Expo

The article details Ant Group’s security parallel aspect fusion AI solution, selected as an exemplary case at the 2024 World Intelligent Industry Expo, explaining its multi‑dimensional data collection, large‑model integration, baseline construction, knowledge‑graph generation, and superior threat‑detection performance.

AIAnt GroupCase Study
0 likes · 4 min read
Ant Group’s Security Parallel Aspect Fusion AI: A Case Study Selected at the 2024 World Intelligent Industry Expo
ITPUB
ITPUB
Apr 26, 2023 · Information Security

Detecting CDK Attacks with Kubernetes Audit Logs: Practical Rules and Pitfalls

This article explains how to enable Kubernetes audit logging, analyzes CDK‑based attack behaviors captured in audit logs, provides concrete detection rules for information collection, exploitation, and privilege escalation, and shares practical lessons learned when deploying audit‑driven security in cloud‑native environments.

CDKContainerKubernetes
0 likes · 18 min read
Detecting CDK Attacks with Kubernetes Audit Logs: Practical Rules and Pitfalls
Bilibili Tech
Bilibili Tech
Apr 18, 2023 · Cloud Native

Kubernetes Audit Log Analysis for Container Security

The article explains how to enable Kubernetes audit logging and use its detailed fields—such as userAgent, responseStatus, requestURI, and object references—to detect CDK‑generated attacks and other threats like CVE‑2022‑3172, privilege escalation, and backdoor deployment, offering practical detection examples and security recommendations.

API ServerAudit loggingCDK
0 likes · 15 min read
Kubernetes Audit Log Analysis for Container Security
Dada Group Technology
Dada Group Technology
Jun 20, 2022 · Information Security

Design and Implementation of JD Daojia Security Operations Center (SOC) Platform

This article details the challenges, design choices, deployment steps, detection model creation, data processing, visualization, and future plans of JD Daojia's security operations platform, highlighting the use of Graylog, Elasticsearch, and MongoDB to achieve scalable, real‑time threat detection and response.

Data visualizationGraylogSOC
0 likes · 16 min read
Design and Implementation of JD Daojia Security Operations Center (SOC) Platform
NetEase Yanxuan Technology Product Team
NetEase Yanxuan Technology Product Team
Jun 13, 2022 · Information Security

How to Build a Robust Mobile App Security Framework: Threat Models, Detection, and Defense Strategies

This article examines the security challenges of mobile apps, outlines common threat scenarios such as flash‑sale abuse and fake device attacks, and proposes a layered detection‑and‑defense framework that combines app‑side identification, device fingerprinting, scenario verification, and cloud‑based policy enforcement.

Mobile SecurityThreat Detectionapp protection
0 likes · 20 min read
How to Build a Robust Mobile App Security Framework: Threat Models, Detection, and Defense Strategies
Architects' Tech Alliance
Architects' Tech Alliance
Oct 11, 2021 · Information Security

How AI‑Powered Firewalls Outperform Traditional NGFWs in Detecting Advanced Threats

The article examines why conventional next‑generation firewalls (NGFW) struggle with sophisticated, unknown attacks, and explains how Huawei’s AI firewall leverages cloud‑trained and on‑premise unsupervised learning models, dedicated hardware, and encrypted‑traffic analysis to automatically detect and mitigate advanced threats across the attack chain.

AI firewallNGFWThreat Detection
0 likes · 9 min read
How AI‑Powered Firewalls Outperform Traditional NGFWs in Detecting Advanced Threats
360 Smart Cloud
360 Smart Cloud
Feb 9, 2021 · Information Security

Using DNS for Network Measurement and Security Analysis

This article explains how DNS, the Internet's core naming protocol, can be leveraged for large‑scale network measurement and security analysis, covering DNS hijacking metrics, NTP pool observations, passive DNS techniques, and the DNSMon threat‑detection system with practical insights and references.

DNSData AnalyticsThreat Detection
0 likes · 12 min read
Using DNS for Network Measurement and Security Analysis
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Dec 23, 2020 · Information Security

Unlocking DNS: Measuring Networks and Detecting Threats with Data

This article explains how DNS data can be leveraged for both network measurement—such as quantifying global DNS hijacking and analyzing NTP pool servers—and security analysis, including threat detection with systems like DNSMon, highlighting the protocol’s growing importance for privacy, performance, and threat intelligence.

DNSNTP poolThreat Detection
0 likes · 11 min read
Unlocking DNS: Measuring Networks and Detecting Threats with Data
360 Tech Engineering
360 Tech Engineering
Dec 22, 2020 · Information Security

Using DNS for Network Measurement and Security Analysis

This article presents a comprehensive overview of DNS-based network measurement and security analysis, covering DNS fundamentals, hijacking metrics, NTP pool studies, passive DNS applications, and the DNSMon threat‑detection system, highlighting methods, findings, and practical implications for internet security.

DNSData AnalyticsThreat Detection
0 likes · 12 min read
Using DNS for Network Measurement and Security Analysis
Efficient Ops
Efficient Ops
Oct 27, 2020 · Information Security

How to Detect Account Security Threats Using Log Analysis and Alerts

This article explains practical methods for detecting account security threats—such as blacklisted, expired, or abnormal login behaviors—by analyzing Linux and Windows login logs, defining detection rules, and leveraging automated tools to generate timely alerts and reduce security risks.

Threat Detectionaccount securityincident response
0 likes · 27 min read
How to Detect Account Security Threats Using Log Analysis and Alerts
Architects Research Society
Architects Research Society
Jul 7, 2020 · Information Security

Understanding Cloud Access Security Brokers (CASB): Functions, Benefits, and Deployment Models

A Cloud Access Security Broker (CASB) sits between cloud service consumers and providers to enforce security, compliance, and governance policies, offering visibility, data protection, threat detection, and control over shadow IT, with various deployment modes and integration options for modern cloud environments.

CASBData ProtectionThreat Detection
0 likes · 15 min read
Understanding Cloud Access Security Brokers (CASB): Functions, Benefits, and Deployment Models
Efficient Ops
Efficient Ops
Sep 19, 2019 · Information Security

How to Uncover Hidden Threats: Mastering Web Log Analysis with Secsoso

This guide explains why web log analysis is essential for security, demonstrates how to parse Apache logs, distinguishes normal from malicious requests, and provides practical Secsoso commands for business behavior statistics, traffic monitoring, and detecting attacks such as CC, SQL injection, file inclusion, and XSS.

Threat DetectionWeb Securitylog analysis
0 likes · 19 min read
How to Uncover Hidden Threats: Mastering Web Log Analysis with Secsoso
JD Tech
JD Tech
Dec 10, 2018 · Information Security

Container Sandbox for Contextual Behavior Analysis Presented at BlackHat Europe

JD Security’s Silicon Valley AI security scientist unveiled a novel container‑based sandbox at BlackHat Europe, detailing how contextual behavior analysis can detect and trace malicious code by leveraging lightweight containers, improving threat detection speed and accuracy for enterprise defenses.

AI securityContainer SecurityThreat Detection
0 likes · 6 min read
Container Sandbox for Contextual Behavior Analysis Presented at BlackHat Europe
Suning Technology
Suning Technology
Jan 17, 2018 · Information Security

How Suning Built a Robust Security Architecture for E‑Commerce

This article examines Suning's evolution from a basic network‑operations unit to a comprehensive security ecosystem, detailing its organizational structure, protection platforms, integrated risk‑control mechanisms, big‑data threat perception system, and management processes that together safeguard its e‑commerce operations.

Security ArchitectureThreat Detectione‑commerce
0 likes · 12 min read
How Suning Built a Robust Security Architecture for E‑Commerce
MaGe Linux Operations
MaGe Linux Operations
Sep 19, 2017 · Information Security

Master Network Security: A Complete Mind Map of Threats & Defenses

This article presents a detailed mind‑map of network security, covering introductory concepts, scanning and defense, monitoring, password cracking, deception attacks, denial‑of‑service, buffer overflow, web and trojan attacks, computer viruses, and future trends, each illustrated with explanatory images.

Threat Detectioncybersecuritydefense techniques
0 likes · 3 min read
Master Network Security: A Complete Mind Map of Threats & Defenses
Architect
Architect
Jan 19, 2016 · Information Security

100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook

The article presents a comprehensive list of one hundred concrete web‑application security techniques—ranging from HTTP request analysis and token validation to WAF rule conversion, honeypot deployment, IP reputation checks, and response‑time monitoring—derived from the book “Web Application Defender's Cookbook” and illustrated with real‑world examples and tool references.

ModSecuritySecurity OperationsThreat Detection
0 likes · 16 min read
100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook