Tagged articles
9 articles
Page 1 of 1
Ops Community
Ops Community
Aug 23, 2025 · Information Security

Top 10 Linux Security Threats in 2025 Every Ops Engineer Must Know

This 2025 Linux security threat report breaks down the ten most critical risks—ranging from supply‑chain poisoning to AI‑driven APT attacks—offering real‑world case studies and actionable, step‑by‑step mitigation strategies for Linux operations teams.

Container SecurityLinux securityOperations
0 likes · 14 min read
Top 10 Linux Security Threats in 2025 Every Ops Engineer Must Know
Tencent Technical Engineering
Tencent Technical Engineering
Apr 10, 2025 · Information Security

AI-Generated Code Introduces XSS Vulnerabilities: A Case Study and Security Guidance

The Woodpecker team shows that AI‑generated code, exemplified by Simon Willison’s HTML slideshow tool, can embed unsanitized inputs that create exploitable XSS flaws, and they recommend zero‑trust AI prompts, rigorous input filtering, CSP, AI‑assisted scanning, and secure supply‑chain practices to mitigate such risks.

AI securityCSPSimon Willison
0 likes · 9 min read
AI-Generated Code Introduces XSS Vulnerabilities: A Case Study and Security Guidance
Liangxu Linux
Liangxu Linux
Oct 27, 2024 · Information Security

Unlocking the Secrets of Network Ports: Risks, Attacks, and Defense Strategies

This comprehensive guide explains what network ports are, categorizes well‑known, registered, and dynamic ports, demonstrates common scanning tools and commands, details typical hacker techniques such as SYN scans, buffer overflows, DoS attacks, and provides practical firewall, IDS, and authentication hardening measures for each vulnerable service.

network portsnetwork securityport scanning
0 likes · 31 min read
Unlocking the Secrets of Network Ports: Risks, Attacks, and Defense Strategies
JD Tech
JD Tech
May 26, 2023 · Information Security

JD Cloud RASP Runtime Application Self‑Protection: Architecture, Principles, and Best Practices

This article examines JD Cloud's Runtime Application Self‑Protection (RASP) technology, detailing its background, architecture, working principles, security advantages over traditional WAF and SAST/DAST, practical 0‑day protection examples, deployment scenarios, operational practices, and real‑world performance in large‑scale promotions and national‑level cyber‑exercises.

Application SecurityCloud NativeRASP
0 likes · 14 min read
JD Cloud RASP Runtime Application Self‑Protection: Architecture, Principles, and Best Practices
Programmer DD
Programmer DD
Jan 10, 2022 · Information Security

Why the FTC Demands Immediate Log4j2 Fixes and How to Protect Your Data

The FTC urges companies to urgently patch Log4j2 (CVE‑2021‑44228) after a month of attacks by state‑backed hackers, warning of massive data leaks, financial loss, and potential lawsuits, while highlighting past cases like Equifax’s $700 million settlement.

CVE-2021-44228FTCInformation Security
0 likes · 4 min read
Why the FTC Demands Immediate Log4j2 Fixes and How to Protect Your Data
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 15, 2021 · Information Security

How to Patch the Apache Log4j2 Vulnerability in Dble

This guide explains four remediation methods for the Log4j2 security flaw in Dble, including upgrading to Log4j2 2.16.0, adding a configuration property, adjusting JVM parameters for older versions, and setting a system environment variable, with detailed step‑by‑step instructions and code snippets.

Security Patchjavalog4j2
0 likes · 6 min read
How to Patch the Apache Log4j2 Vulnerability in Dble
Laiye Technology Team
Laiye Technology Team
Nov 17, 2020 · Information Security

Comprehensive Security Practices and Vulnerability Mitigation at Laiye Technology

This article details Laiye Technology's end‑to‑end security strategy—including application hardening, password policies, brute‑force defenses, SQL injection, XSS and CSRF mitigations, privilege controls, secure file uploads, code‑review standards, and infrastructure vulnerability scanning—to protect sensitive data and AI‑driven robot platforms from a wide range of attacks.

CSRFPassword policySQL injection
0 likes · 21 min read
Comprehensive Security Practices and Vulnerability Mitigation at Laiye Technology