×

Alibaba Cloud Security

1445 Reputation

Follow
Activities(32) Posts(32) Series(0) Areas of Expertise Following Followers

Alibaba Cloud Security Posted blog

Alibaba Cloud Released Industry's First Trusted and Virtualized Instance with Support for SGX 2.0 and TPM

Recently, Alibaba Cloud announced its support for SGX 2.0 and released a virtualized ECS instance based on SGX 2.0 and TPM.

Alibaba Cloud Security Posted blog

A New Chapter in Modernizing Security with Cloud-Native Technologies: Identity Management

A discussion about the "Human Element" of cybersecurity, why it's so important, why no one is talking about it, and how it can be improved.

Alibaba Cloud Security Posted blog

Alibaba Cloud Security Center Launches a One-Click Anti-ransomware Feature

Alibaba Cloud Security Center released a one-click feature that provides multi-layer defense against ransomware.

Alibaba Cloud Security Posted blog

Cloud-based Mining Botnet Trends in 2019: Mining Trojans Spreading as Worms

This article provides an in-depth analysis of the trends of mining trojans observed in 2019 based on the long-term monitoring data of the Alibaba Cloud Security team.

Alibaba Cloud Security Posted blog

New Outbreak of h2Miner Worms Exploiting Redis RCE Detected

In this post, we'll discuss the recent outbreak of h2Miner worms, which exploit Redis's Remote Command Execution (RCE), and also share some useful security tips by the Alibaba Cloud Security team.

Alibaba Cloud Security Posted blog

What Defenders Must Do to Fight Hackers and Cyber Attacks Using More Powerful Weapons?

By Wu Fan (Wufan) and Guo Weibo (Sangduo) Special thanks to: Huangxing, Cangbo, Muming, Xijun, Ziyi, Xuzheng, Nanxun, Suddy (In no particular order) ...

Alibaba Cloud Security Posted blog

Six Key Elements of an Off-Premises Data Security System

This article enumerates six elements of an off-premises data security system, highlighted by Xiao Li, General Manager of Alibaba Cloud Intelligent Security division at the 2nd Data Security Summit.

Alibaba Cloud Security Posted blog

How to Deal With DDoS Attacks on a Global Scale

This article discusses the new network security challenges under IPv6 and recommends the best practices of IPv6 DDoS defense by Alibaba Cloud to tackle DDoS attacks on a global scale.

Alibaba Cloud Security Posted blog

Decoding the AI Defense System Behind Alibaba Cloud Web Application Firewall (WAF)

This article explains how the AI defense system of Alibaba Cloud's WAF solves security challenges concerning open-loop problem spaces and asymmetric positive and negative spaces.

Alibaba Cloud Security Posted blog

Successful Defense against 6 Billion Attacks through Human-Machine Collaboration

This article explores how Alibaba Cloud security solutions helped ensure the success of this year's Alibaba Singles' Day (Double 11) Shopping Festival through human-machine collaboration.

Alibaba Cloud Security Posted blog

Learn the Strategies and Tactics of Cryptocurrency Mining Trojans

This article will look at some common technologies and development trends of cryptocurrency mining Trojans, showing you how you can better project yourself.

Alibaba Cloud Security Posted blog

Next-Gen Enterprise Security Based on Cloud-Native Technology

The senior director of the Cloud security department at Alibaba Cloud discusses the idea of next-gen enterprise security architecture designs based on cloud-native tech.

Alibaba Cloud Security Posted blog

Solr Dataimport Vulnerability Becomes a New Attack Method for Mining Organizations

Alibaba Cloud security team has detected a new attack method using the Solr dataimport RCE vulnerability (CVE-2019-0193) that implants mining programs into target hosts.

Alibaba Cloud Security Posted blog

Alibaba Cloud Offers FIPS Validated HSM for Crypto Key Security

Alibaba Cloud has announced the beta release of Managed HSM, a cloud-managed hardware security module to protect your most sensitive workloads and assets.

Alibaba Cloud Security Posted blog

8220 Mining Group Now Uses Rootkit to Hide Its Miners

The Alibaba Cloud Security Team has recently discovered that the 8220 Mining Group began using rootkit to hide its mining programs.

Alibaba Cloud Security Posted blog

A New Trend of DDoS Attacks: Mobile Devices Are Becoming a New Generation of Botnets

This article analyzes the characteristic features of a new trend of DDoS attacks launched by mobile botnets.

Alibaba Cloud Security Posted blog

Xulu: Cryptojacking Leveraging Shodan, Tor, and Malicious Docker Container

Alibaba Cloud has recently detected Xulu, a mining botnet that deploys malicious containers by exploiting Docker's remote API unauthorized Access vulnerability.

Alibaba Cloud Security Posted blog

Deep Dive into Cloud Firewall: Addressing Aggressive Mining Worms

This article provides an in-depth analysis of how Alibaba Cloud's Cloud Firewall addresses aggressive mining worms.

Alibaba Cloud Security Posted blog

Return of Watchbog: Exploiting Jenkins CVE-2018-1000861

Watchbog, a cryptocurrency-mining botnet, has made a comeback by exploiting Jenkins CVE-2018-1000861 this time.

Alibaba Cloud Security Posted blog

ImposterMiner Trojan Takes Advantage of Newly Published Jenkins RCE Vulnerability

Alibaba Cloud Security team has recently detected a crypto-mining attack which uses the newly published Jenkins RCE vulnerability as its attack vector.

Latest Comments
No series yet.