腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] Analysts from @ PassiveTotal discover a multi-year operation connecting over 7 different nation-state actors. http://blog.passivetotal.org/passivetotal-discovers-multi-actor-infrastructure-nexus/ #threat
"PassiveTotal 发现了一个长达多年的、至少 7 个国家参与的攻击行动: https://t.co/TtVa2udlP6"
-
[ Conference ] Day 1 Briefings presentation materials for #BHASIA 2016 are now posted and available online here: https://www.blackhat.com/asia-16/briefings.html
"BlackHat Asia 2016 会议所有的 Slides︰ https://t.co/UxLGIvnM1x"
-
[ iOS ] FBI vs Apple: FBI is lucky, https://translate.google.com/translate?sl=auto&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=http%3A%2F%2Fblog.pangu.io%2Ffbi-vs-apple%2F&edit-text= (google translated)
"FBI vs Apple: FBI是幸运的,来自盘古 Blog: http://blog.pangu.io/fbi-vs-apple/ "
-
[ Malware ] Most prevalent Android ransomware in the West arrives in Japan http://www.symantec.com/connect/ko/blogs/most-prevalent-android-ransomware-west-arrives-japan
"在西方最流行的 Android 勒索软件 Lockdroid 来到日本了: https://t.co/Ez8XVOyZKa"
-
[ Malware ] Ransomware Petya - a technical review https://blog.gdatasoftware.com/2016/03/28226-ransomware-petya-a-technical-review
"GData 对 Petya 勒索软件的分析: https://t.co/khn7CpRBrd"
-
[ Others ] As promised, my #ZonCon slides on "[B]joern: Towards Pattern-Based Vulnerability Discovery in Binary Code": http://user.informatik.uni-goettingen.de/~fyamagu/pdfs/2016-zoncon.pdf
"基于模式的二进制漏洞挖掘: https://t.co/DU2JCgdtNA"
-
[ Others ] PHP, Python and Google Go Fail to Detect Revoked TLS Certificates http://ow.ly/10aFPp
"PHP, Python 和 Google Go 无法检测吊销的 TLS 证书: https://t.co/4gLxQKZQnj"
-
[ Others ] Windows Kernel Bitmap Use-After-Free https://packetstormsecurity.com/files/136515/GS20160331234039.tgz
"Windows kernel bitmap use-after-free, Project Zero Issue 686: https://bugs.chromium.org/p/project-zero/issues/detail?id=686 "
-
[ Pentest ] Just published: 'Persistence Architecture Matters' from @ ukstufus on persistence issues on 64-bit Windows systems https://labs.mwrinfosecurity.com/blog/persistence-architecture-matters/
"64 位 Windows 渗透测试时保持持久连接的问题: https://t.co/cENzd5S5yo"
-
[ Tools ] Daaaang. dnSpy, .NET decompiler, debugger and assembly editor. Thanks to @ John5hade for the heads up... https://github.com/0xd4d/dnSpy/releases
"dnSpy - 之前推送过这个工具, 这是个 .NET 的编辑器、反编译器、调试器, Github Repo: https://t.co/41CZwD4rXb"
-
[ Windows ] List of Linux syscalls presumably supported by Windows 10 (extracted from lxcore.sys): http://redplait.blogspot.fr/2016/03/lxcore-syscall-table.html
"Windows 10 (lxcore.sys) 支持的 Linux 系统调用列表 ︰ https://t.co/vU6RcatpdB"