Frequent verification codes may appear for non-Mainland China IP visits. If visitors are severely affected, please send [IP|ASN](|AS14618) to the bottom mailbox to add to the whitelist


2021-12-16 19:24   Log4j for Dummies    #[email protected] #安全文章 log4j is the beginning of something huge that we do not know what severe state will endContinue reading on Medium »

2021-10-04 01:59   Typosquatting — what happens when you mistype a website    #[email protected] #安全文章 Typosquatting is a perfect use case because when people look at URLs and internalize their own missp

2021-08-07 22:10   A technique for Internet Censorship Circumvention: Domain Fronting    #[email protected] #安全文章 Mandiant and FireEye reported that they discovered the APT29 group supported by the Russian nation-s

2021-07-31 19:58   Pegasus Spyware in a Nutshell    #[email protected] #安全文章 Pegasus Spyware has recently hit the headlines because it is used to target devices of critical peop

2021-07-25 21:52   The Most Prominent Pandemics Of Cyber Viruses    #[email protected] #安全文章 Malware has become more sophisticated and attacks vulnerabilities in countless ways.Continue reading

2021-07-20 19:08   Cybersecurity Maturity Model Certification (CMMC): Here is What You Need to Know!    #[email protected] #安全文章 The US Department of Defense has introduced the Cybersecurity Maturity Model Certification (CMMC) to

2021-07-18 19:52   The Birth and Rise of Remote Access Trojans (RATs)    #[email protected] #安全文章 The RATs themselves should consider using threat information to detect new digital threats and imple

2021-06-21 06:13   Exploiting X11 Unauthenticated Access    #[email protected] #安全文章 X11 for Windows systems is a graphical window system common to Unix and Linux implementations and fo

2021-06-14 05:21   Trusted Execution Environment (TEE), Implementations, Drawbacks    #[email protected] #安全文章 The Trusted Execution Environments are one of the technologies that help manufacturers, service prov

2021-04-10 20:27   Zero-Knowledge Proofs (ZKPs)    #[email protected] #安全文章 Zero-knowledge proof systems that have received a lot of attention since their introduction are thos

2021-03-27 01:11   Credential Stuffing Explained: What is it? How to detect? How to prevent it?    #[email protected] #安全文章 The billions of login credentials available on the dark web make it easy for cybercriminals to steal