
Combining ppid deception and far-thread injection to achieve DLL hollowing
ParsingofDLLHollowingtechnologyExploringhollowingtechnology,thefocusisonDLLHollowing(DLL...
Coinbase has become the main target of recent GitHub Actions supply chain attacks
ResearchershavefoundthatCoinbasehasbeenthemaintargetofrecentGitHubActionssupplychain...

CodeQL Learning Notes (1)
IhaverecentlybeenstudyingCodeQL,andthereisnoneedtointroduceCodeQLhere,astherearepl...

CodeQL automated vulnerability detection getting started
CodeQLIntroductionCodeQLisanenginethatcananalyzecode,securitypersonnelcanuseitasanau...

Cloudflare WAF Bypass (simple but effective)
ForewordInthefieldofinformationsecurity,findingandexploitingvariousvulnerabilitiesisthe...

Cloud-native Kubernetes security
Withmoreandmoreenterprisesbeginningtomovetothecloud,intheattackanddefenseexercises,...

Cloud Native Security Series 1: Zero Trust Security and Software Development Life Cycle
Introduction:Automationhasappearedinvariousformsfordecades,anditisonlynowthatwearebe...
Cloud Migration Security (Part Two): Understanding AWS Cloud Security Strategies from the Perspective of Buying and Decorating a House
Thereisasignificantgapincloudadoptionrate(85%vs.43%)andwillingnesstomigratetothecl...
Cloud Migration Security (Part 1): Gartner's 5R Security Migration Model
ThedifferenceincloudadoptionratesbetweenChineseandEuropean-Americanenterprisesissignific...

Cloud functions can implement proxy pool to bypass IP blocking
IntroductiontocloudfunctionsCloudfunctions(ServerlessFunctions)areanevent-drivencomputing...