Tagged articles
16 articles
Page 1 of 1
ITPUB
ITPUB
Apr 20, 2026 · Industry Insights

Why Cal.com Closed Its Source: AI‑Driven Threats Redefining Open‑Source Security

The article analyzes Cal.com’s abrupt shift to a closed‑source model, arguing that AI‑powered vulnerability discovery has turned open‑source transparency from a defensive advantage into a liability, and explores industry reactions, supporting data, and broader implications for the future of open‑source software.

AI securityindustry insightsopen source
0 likes · 11 min read
Why Cal.com Closed Its Source: AI‑Driven Threats Redefining Open‑Source Security
SuanNi
SuanNi
Apr 10, 2026 · Information Security

How Tiny Memory Files Turn AI Assistants into Hackable Backdoors

Researchers from UC Berkeley, NUS, Tencent and ByteDance reveal that a single hidden line in an AI assistant’s memory file can trigger OpenClaw to leak core keys or erase disks, detailing a three‑dimensional CIK attack model, real‑world tests on four top LLMs, and mitigation strategies.

AI securityCIK architectureMemory injection
0 likes · 11 min read
How Tiny Memory Files Turn AI Assistants into Hackable Backdoors
Black & White Path
Black & White Path
Feb 9, 2026 · Information Security

How a One‑Click Flaw in OpenClaw Lets Attackers Steal the Master Key and Gain God‑Mode Access

A security analysis reveals that a high‑severity vulnerability in the open‑source AI assistant OpenClaw allows an attacker to steal the master authentication token and obtain unrestricted "god‑mode" control of the host through a single malicious link, and outlines the technical cause, attack chain, and mitigation steps.

AI Agent SecurityOpenClawRemote Code Execution
0 likes · 4 min read
How a One‑Click Flaw in OpenClaw Lets Attackers Steal the Master Key and Gain God‑Mode Access
Tencent Technical Engineering
Tencent Technical Engineering
Dec 19, 2025 · Artificial Intelligence

How Safe Is AI-Generated Code? Real‑World Risks and Mitigation Strategies

This study investigates the security performance of AI‑generated code in real‑world software projects, revealing high vulnerability rates, language‑specific adoption patterns, and evolving roles in the vulnerability lifecycle, and proposes a multi‑dimensional framework for risk mitigation and safe AI‑assisted development.

AICode GenerationEmpirical Study
0 likes · 16 min read
How Safe Is AI-Generated Code? Real‑World Risks and Mitigation Strategies
Tencent Technical Engineering
Tencent Technical Engineering
Jul 1, 2025 · Information Security

How Wukong AI Agent Uncovered a Critical RCE Vulnerability in LLaMA‑Factory (CVE‑2025‑53002)

This article details how the Wukong AI Agent automatically audited the popular LLaMA‑Factory project, discovered a high‑severity remote code execution vulnerability (CVE‑2025‑53002) caused by unsafe torch.load usage, reported it to the maintainers, and demonstrated the official fix that adds a secure weights_only flag.

AI securityCVE-2025-53002LLaMA-Factory
0 likes · 8 min read
How Wukong AI Agent Uncovered a Critical RCE Vulnerability in LLaMA‑Factory (CVE‑2025‑53002)
Sohu Tech Products
Sohu Tech Products
May 7, 2025 · Information Security

Why MCP Protocol Is a Security Nightmare: Real Attack Cases and Mitigations

This article provides a comprehensive security analysis of the Model Context Protocol (MCP), exposing multiple attack vectors such as prompt poisoning, tool poisoning, command and code injection, and illustrating how MCP’s design flaws make it more vulnerable than traditional applications while offering concrete mitigation recommendations.

AI SafetyCode InjectionMCP
0 likes · 34 min read
Why MCP Protocol Is a Security Nightmare: Real Attack Cases and Mitigations
Practical DevOps Architecture
Practical DevOps Architecture
Mar 14, 2024 · Information Security

Comprehensive Penetration Testing Course Outline

This article provides a detailed curriculum for a penetration testing training program, covering operating system basics, web services, database setup, Kali Linux installation, various hacking tools, common web vulnerabilities, SQL injection techniques, command execution, file upload and inclusion flaws, XSS, CSRF, SSRF, privilege escalation, and internal network exploitation.

ethical hackinginformation securitynetwork security
0 likes · 10 min read
Comprehensive Penetration Testing Course Outline
OPPO Amber Lab
OPPO Amber Lab
Jan 19, 2024 · Information Security

Uncovering Android AIDL/HIDL Service Vulnerabilities: Methods and Real CVE Examples

This article explains how Android AIDL and HIDL services are generated, outlines systematic steps to enumerate services, filter Java implementations, and automate information gathering, then details common memory‑corruption bug patterns and demonstrates real CVE‑2023‑21008 and CVE‑2023‑20766 exploits, concluding with a risk assessment.

AIDLAndroidCVE
0 likes · 9 min read
Uncovering Android AIDL/HIDL Service Vulnerabilities: Methods and Real CVE Examples
Bilibili Tech
Bilibili Tech
Apr 18, 2023 · Cloud Native

Kubernetes Audit Log Analysis for Container Security

The article explains how to enable Kubernetes audit logging and use its detailed fields—such as userAgent, responseStatus, requestURI, and object references—to detect CDK‑generated attacks and other threats like CVE‑2022‑3172, privilege escalation, and backdoor deployment, offering practical detection examples and security recommendations.

API ServerAudit loggingCDK
0 likes · 15 min read
Kubernetes Audit Log Analysis for Container Security
21CTO
21CTO
Dec 31, 2020 · Information Security

Which Languages Have the Worst Security Bugs? Veracode’s Latest Report

Veracode’s State of Software Security Volume 11 reveals that, among popular languages, C++ and PHP suffer the most severe vulnerabilities, while JavaScript and Python see rising issues, highlighting the need for developers to prioritize secure coding practices, regular updates, and careful management of third‑party dependencies.

Secure CodingSoftware SecurityVeracode
0 likes · 7 min read
Which Languages Have the Worst Security Bugs? Veracode’s Latest Report
Code Ape Tech Column
Code Ape Tech Column
Aug 20, 2020 · Information Security

How to Spot MyBatis SQL Injection Vulnerabilities: A Practical Guide

This article walks through the typical ways MyBatis can introduce SQL injection—through misuse of # and $ in LIKE, IN, and ORDER BY clauses—provides correct code examples, and demonstrates a step‑by‑step reverse‑engineering workflow on an open‑source CMS to locate and confirm the vulnerability.

Code AuditingJavaMyBatis
0 likes · 7 min read
How to Spot MyBatis SQL Injection Vulnerabilities: A Practical Guide
Meituan Technology Team
Meituan Technology Team
Mar 12, 2020 · Information Security

Cloud Native Security: Container Escape and Mitigation Strategies

Meituan's security team explains cloud‑native architecture, outlines container‑escape threats from kernel bugs, vulnerable runtimes and misconfigurations, and recommends mitigation through hardened kernels, secure‑container runtimes like gVisor or Kata, rigorous patch management, and collaborative feature development to strengthen runtime protection.

Container SecurityDockerKata Containers
0 likes · 20 min read
Cloud Native Security: Container Escape and Mitigation Strategies
Architects Research Society
Architects Research Society
Mar 30, 2017 · Information Security

Industrial Control System (ICS) Protocols and Security Overview

This article provides a comprehensive overview of industrial control system terminology, common SCADA‑related protocols such as Modbus, PROFIBUS, DNP3, OPC, BACnet, and Siemens S7, their security weaknesses, detection scripts, and vulnerability analysis resources.

Protocol SecuritySCADAindustrial control
0 likes · 9 min read
Industrial Control System (ICS) Protocols and Security Overview
Efficient Ops
Efficient Ops
Mar 12, 2017 · Information Security

Understanding the CVE-2017-5638 Struts2 RCE: Impact, Stats, and Fixes

The article examines the high‑risk CVE‑2017‑5638 vulnerability in Apache Struts2, detailing its remote code execution mechanism, global impact statistics across industries and regions, and provides comprehensive detection methods and three tiers of remediation solutions.

Apache StrutsCVE-2017-5638Patch management
0 likes · 6 min read
Understanding the CVE-2017-5638 Struts2 RCE: Impact, Stats, and Fixes