Tag

cybersecurity

1 views collected around this technical thread.

AntTech
AntTech
Jun 6, 2025 · Information Security

How Ant Group’s Aspect‑Fusion AI Boosts Threat Detection and Reduces False Alarms

Ant Group’s “Aspect‑Fusion Intelligence” system, recognized as an outstanding cybersecurity case at the 2025 Beijing Cybersecurity Conference, leverages large‑model AI and expert knowledge to enhance threat detection, lower false positives, and improve explainability in large‑scale intrusion detection.

AIAnt Groupcase study
0 likes · 4 min read
How Ant Group’s Aspect‑Fusion AI Boosts Threat Detection and Reduces False Alarms
Efficient Ops
Efficient Ops
May 27, 2025 · Information Security

How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm

Guangzhou police investigated a foreign cyber‑attack on a local tech firm, traced the malicious code to a Taiwan‑based hacker group linked to the DPP, and detailed the group’s low‑level tactics, extensive asset scanning, and use of VPNs and overseas cloud servers.

Taiwan hacker groupcybersecurityhacker attribution
0 likes · 4 min read
How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm
Efficient Ops
Efficient Ops
May 20, 2025 · Information Security

How an Overseas Hacker Group Disrupted a Guangzhou Tech Company's Services

A coordinated overseas cyber‑attack breached a Guangzhou tech firm's self‑service equipment backend, causing hours of service outage, data leakage, and significant losses, prompting swift police investigation, evidence preservation, and a detailed technical analysis of the attackers' methods.

chinacybersecurityhacker group
0 likes · 4 min read
How an Overseas Hacker Group Disrupted a Guangzhou Tech Company's Services
AntTech
AntTech
Apr 24, 2025 · Artificial Intelligence

Ant Group Presents AI‑Driven Threat Detection Using Parallel Security Slices at the 2nd Wuhan Cybersecurity Innovation Forum

At the second Wuhan Cybersecurity Innovation Forum, Ant Group unveiled its AI‑powered "parallel security slice" approach for threat detection, detailing a multi‑layer defense system that leverages a DKCF framework, large‑model reasoning, and knowledge graphs to improve accuracy, reduce false alarms, and uncover unknown threats in complex digital enterprises.

AIAnt GroupDKCF
0 likes · 4 min read
Ant Group Presents AI‑Driven Threat Detection Using Parallel Security Slices at the 2nd Wuhan Cybersecurity Innovation Forum
DevOps
DevOps
May 23, 2024 · Information Security

Guidelines for Evaluating Large Language Models in Cybersecurity Tasks

The article examines the opportunities and risks of applying large language models (LLMs) to cybersecurity, outlines fourteen practical recommendations for assessing their real‑world capabilities, and concludes with an invitation to the upcoming R&D Efficiency Conference covering AI, product management, and related topics.

AI safetyLLMcybersecurity
0 likes · 11 min read
Guidelines for Evaluating Large Language Models in Cybersecurity Tasks
AntTech
AntTech
May 17, 2024 · Information Security

Exploring and Practicing Cybersecurity Insurance for Small and Medium Enterprises

Amid rapid digital transformation, this article examines the growing importance of cybersecurity insurance for Chinese SMEs, presenting market data, challenges, a three‑layer protection model, and details of a recent industry salon that discussed practical solutions and future pilots.

InsuranceSMEscybersecurity
0 likes · 7 min read
Exploring and Practicing Cybersecurity Insurance for Small and Medium Enterprises
Python Programming Learning Circle
Python Programming Learning Circle
Apr 29, 2024 · Information Security

Why Python Is Ideal for the Cybersecurity Industry and Its Common Applications

The article explains how Python's simplicity, extensive ecosystem, versatility, and strong automation capabilities make it a preferred language for cybersecurity professionals, outlining five key reasons and showcasing typical use cases such as network scanning, penetration testing, malware analysis, security auditing, and tool development.

Pythonautomationcybersecurity
0 likes · 6 min read
Why Python Is Ideal for the Cybersecurity Industry and Its Common Applications
AntTech
AntTech
Nov 6, 2023 · Information Security

Ant Group's Tianqiu Light-Year Security Research Team Wins Tianfu Cup International Cybersecurity Competition with Groundbreaking Exploits

The Tianqiu Light-Year Security Research Team from Ant Group secured the championship and Best Product Cracking Award at the 2023 Tianfu Cup International Cybersecurity Competition by achieving five high‑impact exploits, including a first‑ever VMware ESXi VM escape, Chrome remote code execution, and Adobe Reader defense bypass.

Adobe ReaderChrome RCETianfu Cup
0 likes · 6 min read
Ant Group's Tianqiu Light-Year Security Research Team Wins Tianfu Cup International Cybersecurity Competition with Groundbreaking Exploits
Architects Research Society
Architects Research Society
Oct 7, 2023 · Operations

13 Hardest-to-Fill IT Roles According to the 2021 CIO Survey

The 2021 CIO Survey reveals that organizations worldwide are struggling to fill cybersecurity, AI, and data analytics positions, with remote work expanding the talent pool but also highlighting broader challenges such as employee experience, strict prioritization, and a looming wave of unused vacation time.

Artificial IntelligenceCIO surveyIT hiring
0 likes · 13 min read
13 Hardest-to-Fill IT Roles According to the 2021 CIO Survey
Continuous Delivery 2.0
Continuous Delivery 2.0
Jul 31, 2023 · Information Security

15 Key Cybersecurity Metrics for Measuring and Improving Security Performance

The article outlines fifteen essential cybersecurity metrics—thirteen process indicators such as mean detection and response times, and two result indicators like data loss incidents and security ROI—to help organizations evaluate, monitor, and improve their security posture and inform investment decisions.

cybersecurityincident responsemetrics
0 likes · 4 min read
15 Key Cybersecurity Metrics for Measuring and Improving Security Performance
vivo Internet Technology
vivo Internet Technology
Jun 14, 2023 · Information Security

Vivo Game Anti-Cheat Analysis: Identifying and Combating Black Market Fraud

The article examines Vivo’s gaming platform’s fight against black‑market fraud, outlining profit motives, types of illicit activities, brushing techniques, and the company’s three‑stage anti‑fraud framework—pre‑risk perception, in‑process detection, and post‑strike closure—illustrated with two real‑world case studies.

Vivo platformanti-fraudblack market
0 likes · 13 min read
Vivo Game Anti-Cheat Analysis: Identifying and Combating Black Market Fraud
Architects Research Society
Architects Research Society
Jun 8, 2023 · Information Security

From Flight Training to Industrial Control Systems Cybersecurity: Lessons from SANS ICS612

The article uses a CEO’s one‑hour flight lesson for ten staff as a metaphor to illustrate why hands‑on, relevant experience is essential for effective industrial control systems (ICS) cybersecurity training, and describes the structure and objectives of the SANS ICS612 course.

Hands‑on ExperienceICSSANS
0 likes · 13 min read
From Flight Training to Industrial Control Systems Cybersecurity: Lessons from SANS ICS612
Architects Research Society
Architects Research Society
May 22, 2023 · Information Security

Introduction to Industrial Control Systems (ICS) Security – What They Are, Why They Matter, and Their Unique Challenges

This article introduces industrial control systems (ICS), explains their critical role in essential infrastructure, outlines their components from simple thermostats to complex SCADA architectures, and discusses the unique cybersecurity challenges arising from legacy designs, real‑time requirements, and increasing exposure to corporate networks and the cloud.

Critical InfrastructureICSOT
0 likes · 13 min read
Introduction to Industrial Control Systems (ICS) Security – What They Are, Why They Matter, and Their Unique Challenges
AntTech
AntTech
Apr 7, 2023 · Information Security

Ant Group Launches Cybersecurity Student Innovation Funding Program to Foster Industry‑Academia Collaboration

In 2022, Ant Group and leading cybersecurity firms launched a five‑year funding program to support 1,200 students in open‑source security projects, linking academic research with real‑world industry needs and achieving high academic performance across the first reporting phase.

cybersecurityindustry‑academiainformation security
0 likes · 4 min read
Ant Group Launches Cybersecurity Student Innovation Funding Program to Foster Industry‑Academia Collaboration
vivo Internet Technology
vivo Internet Technology
Sep 21, 2022 · Information Security

Vivo Qianjing Cup Cybersecurity Challenge 2022 Launches

The 2022 Vivo Qianjing Cup Cybersecurity Challenge, launched on September 15 under the “Assemble! Geek Youth” theme, invites nationwide security enthusiasts to uncover vulnerabilities in Vivo products through online puzzles and an offline final, offering a 200,000‑yuan prize pool plus uncapped bounty rewards and judging by experts from AWS, Ant Group and leading universities.

cybersecurityinformation securityprivacy protection
0 likes · 5 min read
Vivo Qianjing Cup Cybersecurity Challenge 2022 Launches
IT Services Circle
IT Services Circle
Mar 11, 2022 · Information Security

Hackers Breach Kaspersky Endpoint Security and Leak Source Code

Recent cyber‑attacks by the NB65 hacker group have compromised Kaspersky Endpoint Security, stealing over 40,000 files—including parts of the product’s source code—and publicly announced plans to release the code within hours, highlighting a significant breach in information security.

KasperskyNB65cybersecurity
0 likes · 4 min read
Hackers Breach Kaspersky Endpoint Security and Leak Source Code
Architects Research Society
Architects Research Society
Jan 28, 2022 · Information Security

Purdue Model and Best Practices for Secure Industrial Control System (ICS) Architecture

This article explains the Purdue Enterprise Reference Architecture (PERA), compares it with other reference models, and outlines best‑practice guidelines for segmenting and protecting industrial control system networks, while reviewing related standards, frameworks, and practical security recommendations.

ICSNetwork SegmentationPurdue Model
0 likes · 25 min read
Purdue Model and Best Practices for Secure Industrial Control System (ICS) Architecture
Beike Product & Technology
Beike Product & Technology
Jan 14, 2022 · Operations

Understanding Black Production in Real Estate: A Case Study of 贝壳

This article analyzes the structure of black production in the real estate industry, focusing on its impact on companies like 贝壳 and the countermeasures implemented to combat it.

Black ProductionIndustry AnalysisReal Estate
0 likes · 9 min read
Understanding Black Production in Real Estate: A Case Study of 贝壳
Java Architect Essentials
Java Architect Essentials
Aug 22, 2021 · Information Security

Former Hospital Network Administrator Carries Out Revenge Attack, Crippling Xi'an Hospital's Diagnostic Systems

In Xi'an's Lianhu District, a disgruntled former network administrator exploited self‑taught networking skills to illegally infiltrate a hospital's internal servers, remotely executing destructive operations that deleted critical files, disabled printers, CT and ultrasound machines, and ultimately caused the entire medical information system to collapse, prompting a police investigation that led to his arrest and criminal detention for damaging computer information systems.

cybersecurityhospitalincident response
0 likes · 5 min read
Former Hospital Network Administrator Carries Out Revenge Attack, Crippling Xi'an Hospital's Diagnostic Systems
Java Architect Essentials
Java Architect Essentials
Aug 1, 2021 · Information Security

Investigation Exposes High‑Tech Investment Scam Apps Built by Elite Computer Science Graduates

A recent police announcement reveals a massive network‑investment fraud scheme in which sophisticated, custom‑made scam apps—developed by top university computer science graduates—tricked victims nationwide into investing over 1 billion yuan, while also operating a large‑scale money‑laundering platform.

cybersecurityinformation securityinvestment fraud
0 likes · 8 min read
Investigation Exposes High‑Tech Investment Scam Apps Built by Elite Computer Science Graduates