Product Project Security Back-end Front-end2024-10-31How to prevent randomness vulnerabilities in Solidity. AliceHsu2024-10-19Unveiling Access Control in Ethereum Smart Contracts: Common Access Control Vulnerabilities AliceHsu2024-10-17Decoding DoS Attacks in Solidity: Security Vulnerabilities and Prevention Strategies. AliceHsu2023-08-25Practical Applications and Challenges of OpenAI Embeddings and Retrieval-Augmented Generation rayH2023-07-18Walking around between Red Team and Blue Team - Purple Man, My Superman zet2023-06-15The Hidden Dangers of CDNs: Why CDNs May Not Be as Secure as You Think seadog0072023-04-14From Start to Finish:A Deep Dive into How Cymetrics Manages Product Development Process ava2023-03-20ChatGPT Hacking Basics nick2023-02-20What is Supply Chain Attack? seadog0072023-02-02The five key factors that hinder SMBs from excellent cybersecurity fangyu2022-09-05How to Choose a Safe Exchange nick2022-06-06Basic Awareness of Hacking Prevention: Data Protection nick2022-04-22Basic Awareness of Hacking Prevention:Backup and Restore nick2022-04-06SSRF and Account Takeover via XSS in ERPNext (0-day) huli2022-03-31Spring4shell - a new critical RCE vulnerability found in Java Spring Framework Cymetrics2022-03-30Sensitive Data Disclosure in WordPress Plugin Amelia < 1.0.49 huli2022-02-21Why can I only reset the password when I forget it and the system couldn’t tell me my old password? huli2022-02-18Taming the OSCP crystal2022-02-08Story of critical security flaws I found in Glints huli2022-01-29DNS Hacking Basics - DNS and records crystal2022-01-25Cache Strategy In Backend genchilu2022-01-04Understanding Log4j and Log4Shell Vulnerabilities from Surveillance Cameras huli2021-11-07BSides Ahmedabad CTF 2021 - entrance huli2021-08-29Concurrency Paradigms: Golang V.S. Java genchilu2021-07-05Java’s Thread Model and Golang Goroutine genchilu2021-05-03The Difference Between Java and Golang in Writing Concurrent Code to Access Shared Variable genchilu