×
Web Application Firewall

Four Common Web Application Security Flaws and What You Can Do to Resolve Them

This blog helps you understand the basics of application security and common network attacks.

How the Cloud Can Help Businesses Gain a Real-Time Understanding

Cloud computing presents businesses of all shapes and sizes with a new route to digital success, without letting your budget run away from you.

How Can You Tackle Network Attacks on CDN Edge Nodes?

Zhao Wei, a senior technical expert with Alibaba Cloud, explains how to build a multi-layer in-depth protection system on CDN edge nodes

8 Ways Alibaba Cloud Security Is Supporting the Fight against COVID-19

In this blog post, we'll discuss the security services developed by Alibaba that were critical in helping organizations in China during the COVID-19 outbreak.

Cloud-based Security Service Provisioning: The Future of Cybersecurity

This blog post shares the parallels of cybersecurity with epidemics and discusses the importance of cloud security operations for enterprises.

We've Just Made a Grand Slam!

Alibaba Cloud WAF was recognized by Gartner, Forrester, Frost and Sullivan, and IDC, as a competitive leader in cloud security.

How to Combat Bots in Today's Digital Age

Discover how you can protect your businesses from the ever-changing and growing number of cyberattacks present in our digital world with Alibaba Cloud.

How Do Alibaba Engineers Recover Data That's Lost

This article explores how Continuous Data Protection (CDP) can mitigate the risk of data loss and provide an efficient data recovery mechanism.

New Outbreak of h2Miner Worms Exploiting Redis RCE Detected

In this post, we'll discuss the recent outbreak of h2Miner worms, which exploit Redis's Remote Command Execution (RCE), and also share some useful security tips by the Alibaba Cloud Security team.

What Defenders Must Do to Fight Hackers and Cyber Attacks Using More Powerful Weapons?

By Wu Fan (Wufan) and Guo Weibo (Sangduo) Special thanks to: Huangxing, Cangbo, Muming, Xijun, Ziyi, Xuzheng, Nanxun, Suddy (In no particular order) ...

Cloud Security for Websites - HTTP Flood Protection

This article explains how to analyze and prevent HTTP flood attacks on websites using Alibaba Cloud's Web Application Firewall.

Decoding the AI Defense System Behind Alibaba Cloud Web Application Firewall (WAF)

This article explains how the AI defense system of Alibaba Cloud's WAF solves security challenges concerning open-loop problem spaces and asymmetric positive and negative spaces.

Learn the Strategies and Tactics of Cryptocurrency Mining Trojans

This article will look at some common technologies and development trends of cryptocurrency mining Trojans, showing you how you can better project yourself.

Solr Dataimport Vulnerability Becomes a New Attack Method for Mining Organizations

Alibaba Cloud security team has detected a new attack method using the Solr dataimport RCE vulnerability (CVE-2019-0193) that implants mining programs into target hosts.

CIA Triad and SSH Brute-Forcing

In this blog, we'll discuss about the CIA triad for information security, and share a simple implementation to protect our servers against SSH brute force attacks.

Exploring the Business Advantages of Cloud Security

By learning from failed attacks and detected threats, cloud security can outperform even large corporate teams of seasoned security professionals.

Defending against TB-level Traffic Attacks with Advanced Anti-DDoS systems

This article discusses the evolution of anti-DDoS technology and describes how each element can affect the overall protection robustness and efficiency.

Windows Networking Troubleshooting 5: HTTPS Exceptions in WAF and IIS

This article discusses the possible causes of web applications running on IIS web servers to be returning HTTPS exceptions.

ImposterMiner Trojan Takes Advantage of Newly Published Jenkins RCE Vulnerability

Alibaba Cloud Security team has recently detected a crypto-mining attack which uses the newly published Jenkins RCE vulnerability as its attack vector.

Deep Dive into Cloud Firewall: Addressing Aggressive Mining Worms

This article provides an in-depth analysis of how Alibaba Cloud's Cloud Firewall addresses aggressive mining worms.