Tagged articles
36 articles
Page 1 of 1
Alibaba Cloud Native
Alibaba Cloud Native
Mar 26, 2026 · Information Security

How to Defend Against PyPI and Docker Hub Supply‑Chain Attacks with Cloud‑Native API Gateways

The article analyzes recent supply‑chain poisoning of the LiteLLM PyPI package and Docker Hub images, explains why PyPI is an attractive attack vector, and details a three‑layer defense using Alibaba Cloud's cloud‑native API Gateway—including KMS‑encrypted credentials, WAF traffic filtering, and Wasm sandbox plugins—to protect the software supply chain.

KMSPyPI poisoningWAF
0 likes · 11 min read
How to Defend Against PyPI and Docker Hub Supply‑Chain Attacks with Cloud‑Native API Gateways
Old Meng AI Explorer
Old Meng AI Explorer
Oct 31, 2025 · Information Security

How SafeLine Turns Your Server into a Zero‑Config WAF in 3 Minutes

SafeLine, an open‑source web application firewall, offers zero‑configuration, multi‑scenario protection against SQL injection, XSS, malicious crawlers, and brute‑force attacks, delivering 99% interception accuracy with minimal resource usage and a simple three‑step Docker deployment for small‑to‑medium sites.

DockerSafeLineServer Security
0 likes · 8 min read
How SafeLine Turns Your Server into a Zero‑Config WAF in 3 Minutes
MaGe Linux Operations
MaGe Linux Operations
Sep 13, 2025 · Information Security

How to Build an Enterprise‑Grade WAF with OpenResty from Scratch

This guide walks through constructing a high‑performance, cost‑effective enterprise‑level Web Application Firewall using OpenResty, covering why OpenResty is ideal, core architecture, modules for request lifecycle management, IP control, rate limiting, SQL injection and XSS detection, intelligent CC protection, monitoring, performance tuning, deployment tips, real‑world case study, and future enhancements.

LuaNginxOpenResty
0 likes · 24 min read
How to Build an Enterprise‑Grade WAF with OpenResty from Scratch
Ops Development & AI Practice
Ops Development & AI Practice
Jul 26, 2025 · Information Security

Mastering XSS: How Attackers Exploit Trust and How to Build Unbreakable Defenses

This article explains the fundamentals of Cross‑Site Scripting attacks, illustrates reflected, stored, and DOM‑based variants with concrete code examples, and presents a four‑step defense strategy—including input validation, output encoding, Content Security Policy, and WAF—to protect web applications.

Content Security PolicyWAFWeb Security
0 likes · 9 min read
Mastering XSS: How Attackers Exploit Trust and How to Build Unbreakable Defenses
php Courses
php Courses
Jan 27, 2025 · Information Security

How to Prevent SQL Injection in PHP Applications

This article explains essential techniques to protect PHP applications from SQL injection attacks, covering prepared statements, input validation, ORM usage, escaping, stored procedures, permission restrictions, web application firewalls, and logging, with practical code examples for PDO, MySQLi, and Eloquent.

ORMPHPPrepared Statements
0 likes · 5 min read
How to Prevent SQL Injection in PHP Applications
Sohu Tech Products
Sohu Tech Products
Sep 20, 2023 · Information Security

How to Secure Your Website with the Open‑Source SafeLine WAF in One Command

This article explains what a Web Application Firewall (WAF) is, introduces the open‑source SafeLine WAF, and provides step‑by‑step instructions for containerized installation, describes its architecture and core security capabilities such as semantic attack detection, IP intelligence, traffic control, and high‑performance protection for web sites.

DockerInstallationNginx
0 likes · 8 min read
How to Secure Your Website with the Open‑Source SafeLine WAF in One Command
Huolala Tech
Huolala Tech
Sep 19, 2023 · Information Security

How to Detect and Block Malicious Bot Traffic Using Log Analysis

This guide explains how to identify and differentiate malicious bot traffic from legitimate requests by analyzing web server logs, leveraging fields such as IP, user‑agent, referer, and parameters, and then applying WAF rules, automation, and security platforms to mitigate attacks and improve operational metrics.

AutomationWAFWeb Security
0 likes · 31 min read
How to Detect and Block Malicious Bot Traffic Using Log Analysis
php Courses
php Courses
Jun 11, 2023 · Information Security

Protecting Nginx with a ModSecurity Web Application Firewall (WAF)

This article explains why web applications need a Web Application Firewall, introduces ModSecurity as a WAF for Nginx, and provides step‑by‑step installation, configuration, custom rule creation, and service restart commands to defend against attacks such as SQL injection and XSS.

ModSecuritySQL injectionWAF
0 likes · 4 min read
Protecting Nginx with a ModSecurity Web Application Firewall (WAF)
MaGe Linux Operations
MaGe Linux Operations
Feb 25, 2023 · Information Security

Top 10 Website Security Threats & How to Defend Your Site

This article examines the ten most common website security attacks—from XSS and SQL injection to DDoS and phishing—explaining their motivations, mechanisms, and practical mitigation strategies such as WAF deployment, input sanitization, SSL encryption, and regular updates to help protect any online presence.

DDoSMitigationSSL
0 likes · 14 min read
Top 10 Website Security Threats & How to Defend Your Site
Bilibili Tech
Bilibili Tech
Jan 17, 2023 · Information Security

Botnet Threat Analysis and Detection Strategies: PBot, Xanthe and Countermeasures

The article delivers a technical overview of modern botnet threats, detailing the PBot and Xanthe families, their infection vectors, command‑and‑control operations, and provides practical detection, mitigation, and statistical analysis methods for defending against large‑scale DDoS, spam, and other malicious activities.

BotnetDetectionSuricata
0 likes · 17 min read
Botnet Threat Analysis and Detection Strategies: PBot, Xanthe and Countermeasures
Tencent Cloud Developer
Tencent Cloud Developer
Jan 16, 2023 · Cloud Native

Scaling Sheep, Sheep, Sheep to Support 100 Million Daily Active Users: A Tencent Cloud Case Study

Tencent Cloud helped the viral game 《羊了个羊》 scale from 5,000 QPS to support over 100 million daily active users in a week by using serverless Kubernetes auto‑scaling, real‑time logging, WAF/Anti‑DDoS protection, CDN, and read‑write separation with Redis, achieving high performance, availability, and scalability.

CDNCloud NativeTKE Serverless
0 likes · 12 min read
Scaling Sheep, Sheep, Sheep to Support 100 Million Daily Active Users: A Tencent Cloud Case Study
Architecture Digest
Architecture Digest
Jun 5, 2022 · Information Security

Root Cause Analysis of Cross-Origin Request Errors Triggered by WAF XSS Filtering

The article details a step‑by‑step investigation of a form‑submission cross‑origin error in a front‑back separated system, tracing the HTTP request flow through DNS, Nginx, Tomcat, and finally identifying a WAF XSS rule that blocked a specific moduleExport field, and explains how the issue was resolved by adjusting the WAF configuration.

CORSDebuggingHTTP
0 likes · 12 min read
Root Cause Analysis of Cross-Origin Request Errors Triggered by WAF XSS Filtering
vivo Internet Technology
vivo Internet Technology
May 11, 2022 · Information Security

Investigation and Resolution of Cross-Origin Errors Caused by WAF XSS Filtering in a Front‑End/Back‑End Separated System

The article recounts a real‑world incident where a JSON POST from a front‑end domain triggered a cross‑origin 418 error because a Web Application Firewall’s XSS filter mistakenly blocked a JavaScript validator field, and after the security team modified the WAF rules the issue was resolved, highlighting systematic debugging and deep knowledge of DNS, Nginx, ingress, Tomcat and WAF layers.

CORSCross-OriginDebugging
0 likes · 12 min read
Investigation and Resolution of Cross-Origin Errors Caused by WAF XSS Filtering in a Front‑End/Back‑End Separated System
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
May 11, 2022 · Information Security

Detecting and Blocking Malicious Bot Traffic with Web Log Analysis

This article explains how to identify and mitigate malicious bot traffic by analyzing web server logs, using command‑line queries, specialized log‑analysis tools, centralized platforms, and automated security workflows, while also outlining operational metrics and response processes for effective protection.

Log MonitoringWAFbot detection
0 likes · 32 min read
Detecting and Blocking Malicious Bot Traffic with Web Log Analysis
HomeTech
HomeTech
Dec 28, 2021 · Information Security

SQL Injection Vulnerability Analysis and Defense Strategies

This article provides a comprehensive analysis of SQL injection vulnerabilities, covering their principles, testing tools, repair methods, and defense strategies, with practical implementation guidance for secure web application development.

Database SecurityOWASPParameterized Queries
0 likes · 15 min read
SQL Injection Vulnerability Analysis and Defense Strategies
Architects Research Society
Architects Research Society
Aug 6, 2020 · Information Security

SQL Injection Attacks: Statistics, Real‑World Examples, and Protection Strategies

This article examines the prevalence of SQL injection attacks, presenting Imperva’s recent statistics, common attack vectors, real-world examples, and practical defenses such as prepared statements, input sanitization, and web application firewalls, while also offering Python code illustrations of secure and insecure database queries.

Database SecurityPythonSQL injection
0 likes · 11 min read
SQL Injection Attacks: Statistics, Real‑World Examples, and Protection Strategies
Efficient Ops
Efficient Ops
Jul 20, 2020 · Information Security

Mastering WAF Deployment: Strategies, Modes, and Load‑Balancing Design

This article examines the rise of web‑application firewalls, outlines common deployment challenges, compares several WAF operating modes—including bypass, layer‑2 transparent, and proxy architectures—and proposes load‑balancing strategies to achieve secure, high‑availability web services.

DeploymentWAFWeb Security
0 likes · 12 min read
Mastering WAF Deployment: Strategies, Modes, and Load‑Balancing Design
Youzan Coder
Youzan Coder
Dec 13, 2019 · Information Security

Boundary Defense in Enterprise Security: Definitions, Value, Techniques, and Youzan’s Implementation

Boundary defense—protective measures at business and IT entry points such as firewalls, WAFs, and secure development lifecycles—provides early‑stage enterprises a clear perimeter through detection, response, protection, and policy, as illustrated by Youzan’s web‑gate WAF, SDL checkpoints, DNS monitoring, and automated security‑ticket processes, enabling a shift toward deeper, defense‑in‑depth strategies.

SDLSecurityWAF
0 likes · 18 min read
Boundary Defense in Enterprise Security: Definitions, Value, Techniques, and Youzan’s Implementation
Architecture Digest
Architecture Digest
Aug 11, 2017 · Information Security

Common Web Attacks and Their Mitigation Techniques

The article introduces major web security threats such as XSS, injection, CSRF, explains their mechanisms with examples, and presents defensive measures including input sanitization, HttpOnly cookies, web application firewalls, and encryption methods like hashing, symmetric and asymmetric cryptography.

CSRFSQL injectionWAF
0 likes · 10 min read
Common Web Attacks and Their Mitigation Techniques
dbaplus Community
dbaplus Community
Aug 9, 2017 · Information Security

Secure Enterprise Ops: Network Segmentation, Hardware, Monitoring & Recovery

This guide outlines practical steps for constructing a secure enterprise operations platform, covering network zone segmentation, selection and deployment of firewalls, IPS/IDS/WAF, endpoint management, web traffic control, monitoring, disaster‑recovery procedures, and incident response best practices to protect corporate data and systems.

IDSIPSWAF
0 likes · 14 min read
Secure Enterprise Ops: Network Segmentation, Hardware, Monitoring & Recovery
dbaplus Community
dbaplus Community
Apr 4, 2017 · Information Security

Mastering Database Injection: Real‑World Attacks, Tools, and Defense Strategies

This comprehensive guide explains why database injection remains a critical security threat, illustrates real‑world attack techniques and toolchains, and provides layered defensive measures—from secure coding and DB‑proxy solutions to web‑server filtering, WAF deployment, and log‑analysis pipelines.

Database SecurityDefense StrategiesSQL injection
0 likes · 24 min read
Mastering Database Injection: Real‑World Attacks, Tools, and Defense Strategies
Qunar Tech Salon
Qunar Tech Salon
Oct 17, 2016 · Information Security

Design and Implementation of a Cloud‑Based Web Application Firewall at Ctrip

This article describes Ctrip's challenges with web security, evaluates hardware and commercial cloud WAF shortcomings, and presents a low‑cost, low‑risk cloud‑based WAF solution that leverages DNS redirection, closed‑loop rule management, Lua/Tengine deployment, supervised machine‑learning log analysis, and big‑data streaming for real‑time threat detection and mitigation.

Big DataWAFWeb Security
0 likes · 9 min read
Design and Implementation of a Cloud‑Based Web Application Firewall at Ctrip
Architect
Architect
Jan 19, 2016 · Information Security

100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook

The article presents a comprehensive list of one hundred concrete web‑application security techniques—ranging from HTTP request analysis and token validation to WAF rule conversion, honeypot deployment, IP reputation checks, and response‑time monitoring—derived from the book “Web Application Defender's Cookbook” and illustrated with real‑world examples and tool references.

ModSecuritySecurity OperationsThreat Detection
0 likes · 16 min read
100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook
Qunar Tech Salon
Qunar Tech Salon
Dec 17, 2015 · Information Security

100 Web Application Defense Techniques from the ‘Web Application Defender’s Cookbook’

The article presents a comprehensive list of one hundred practical web‑application defense techniques—ranging from HTTP request analysis and ModSecurity rule creation to honeypot deployment and automated threat intelligence—drawn from the under‑appreciated book “Web Application Defender’s Cookbook.”

Defensive TechniquesModSecurityWAF
0 likes · 17 min read
100 Web Application Defense Techniques from the ‘Web Application Defender’s Cookbook’