
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Google Patches More Trouble in Mediaserver https://threatpost.com/google-patches-more-trouble-in-mediaserver/117758/
"Android 发布 5 月份补丁更新,本次共修复了 32 个漏洞,其中含 Mediaserver 的多个漏洞,来自 ThreatPost 的报道: https://t.co/pC8Yo4E702 官方的公告: https://source.android.com/security/bulletin/2016-05-01.html "
-
[ Android ] CVE-2016-2445 POC:https://raw.githubusercontent.com/ScottyBauer/Android_Kernel_CVE_POCs/master/CVE-2016-2445.c Full exploit soon.
"Android NVIDIA 视频驱动提权漏洞(CVE-2016-2445) POC: https://t.co/K6p7w1azJo "
-
[ Android ] QSEE privilege escalation vulnerability & exploit : https://bits-please.blogspot.in/2016/05/qsee-privilege-escalation-vulnerability.html , Exploit : https://github.com/laginimaineb/cve-2015-6639 https://t.co/DjHiUu1aBk
"利用 PRDiag* 命令实现 QSEE 提权漏洞的利用(CVE-2015-6639) : https://t.co/xpSjifIenR ; Exploit: https://t.co/PFG1F9asd7 https://t.co/DjHiUu1aBk"
-
[ Attack ] Pwnedlist vulnerability exposed 866M accounts http://www.scmagazine.com/pwnedlist-vulnerability-exposed-866m-accounts/article/493722/
"Pwnedlist 网站漏洞泄漏 8.66 亿用户信息,Pwnedlist 网站主要为企业提供追踪密码泄漏的服务: https://t.co/gxuNIaiXst"
-
[ Browser ] Google Chrome Overtakes Microsoft’s Internet Explorer, Edge Nowhere to Be Found http://windowsitpro.com/windows-10/google-chrome-overtakes-microsoft-s-internet-explorer-edge-nowhere-be-found
"来自 Netmarketshare 的数据显示, Google Chrome 市场占用率首次超过 Internet Explorer: https://t.co/u95lod1z7a"
-
[ Detect ] using pDNS logs to spot malicious activity on your networks: what to look for for low FPs http://buff.ly/1Ob7rez https://t.co/QxMTK7WxyJ
"低成本的威胁检测 Part 2: 高阶模型 - 如何使用采集到的被动 DNS 数据: https://t.co/PRchGfaCft https://t.co/QxMTK7WxyJ"
-
[ Forensics ] Expanding Skype Forensics with OSINT: Email Accounts via @ bellingcat https://www.bellingcat.com/resources/2016/05/02/expanding-skype-forensics-with-osint-email-accounts/
"Skype 取证分析之提取邮件账户: https://t.co/lggSOLPAGf "
-
[ Hardware ] Source code to the @ UPSat_gr cube satellite: https://github.com/librespacefoundation?query=upsat
"Cubesat 卫星的源码 ︰ https://t.co/JAsRjIKTPV"
-
[ Hardware ] Reverse Engineering a Discovered #ATM #Skimmer ~ https://trustfoundry.net/reverse-engineering-a-discovered-atm-skimmer/
"逆向一个 ATM 提款机盗刷器: https://t.co/4fAIvaVyLT"
-
[ IoTDevice ] Vulnerabilities in Samsung's SmartThings https://www.schneier.com/blog/archives/2016/05/vulnerabilities_5.html
"三星智能家居应用 SmartThings 安全性分析: https://t.co/37RQ5YkqIc "
-
[ Linux ] SLAB freelist randomization on linux-next http://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=b735905a4f60283735001c3edef9996e9675e25f & http://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=1a354eccfe6f685eb1ec2a11f6f03aece8db5f11
"Linux SLAB 空闲链表随机化, Git Patch: https://t.co/Vi3MTwXq9C https://t.co/E0Tikis2uM "
-
[ Malware ] #Locky #ransomware spreads via #Flash & Windows kernel #exploit: http://bit.ly/1NEFDEt
"Locky 传播行动中,除了利用 Flash 的漏洞外,最近又加入了内核提权漏洞,来自 Trend Micro Blog: https://t.co/lUsVzSt7nE"
-
[ Malware ] Cryptolocker 4 White Paper Available: The Evolution Continues http://blog.talosintel.com/2016/05/cryptolocker-4-white-paper-available.html
"Cryptolocker 勒索软件第 4 版本白皮书, 来自 Talos: https://t.co/BxwACqvUTk"
-
[ Malware ] Prince of Persia: #Unit42 identifies #Infy #malware active in decade of targeted attacks http://bit.ly/1Z3cQu3
"波斯王子︰ 在定向攻击中活跃十年之久的恶意软件, 来自 Palo Alto Blog: https://t.co/OpE2tYmjPI"
-
[ Malware ] Ransomware deployments after brute force RDP attack https://blog.fox-it.com/2016/05/02/ransomware-deployments-after-brute-force-rdp-attack/
"Fox-IT 最近发现了一个通过暴力破解 RDP 传播勒索软件的样本: https://t.co/dj2QeErV84"
-
[ OpenSourceProject ] Slack users expose corporate credentials while creating new 'bot' tools http://www.scmagazine.com/slack-users-expose-corporate-credentials-while-creating-new-bot-tools/article/493375/
"企业通讯工具 Slack API 存在漏洞,泄露用户 Token: https://t.co/w5BFocez0e "
-
[ Others ] Read the April 2016 Exodus #Intel newsletter: http://ow.ly/4nkOrp #ThreatIntel #CyberSec
" '军火商' Exodus 4 月新闻动态 ︰ https://t.co/PitRCZXQZi "
-
[ Others ] Neat paper comparing @ Hacker0x01 and WooYun ecosystems, complete with #Wassenaar warnings! https://s2.ist.psu.edu/paper/An-Empirical-Study-of-Web-Vulnerability-Discovery-Ecosystems.pdf https://t.co/KlpTNF9GDv
"HackerOne、 WooYun 漏洞挖掘生态系统的实证研究: https://t.co/3x7uQKzzNY https://t.co/KlpTNF9GDv"
-
[ Others ] Software Update Destroys $286 Million Japanese Satellite : http://global.jaxa.jp/projects/sat/astro_h/files/topics_20160415.pdf (pdf)
"软件更新毁掉了价值 2.86 亿的日本卫星 ︰ https://t.co/wUygENakTS "
-
[ Others ] SSH for Fun and Profit : https://karla.io/2016/04/30/ssh-for-fun-and-profit.html
"SSH for Fun and Profit - SSH 到底是如何工作的︰ https://t.co/6IWQ6jjYba"
-
[ Others ] A decade of exploits analyzed - http://offs.ec/1rNL9LE
" 分析 Exploit DB 累积十年的数据: https://t.co/FY1UubrrC5"
-
[ Sandbox ] I wrote a blog on the unprivileged containers I talked about at craft conf & container camp https://blog.jessfraz.com/post/getting-towards-real-sandbox-containers/
" 沙箱与非特权容器: https://t.co/AHzYTzqqmw "
-
[ Tools ] X11 Guide | Firejail https://firejail.wordpress.com/documentation-2/x11-guide/
"Firejail 沙箱工具加入对 X11 视窗应用的支持: https://t.co/1oWAFvy2ba"
-
[ Web Security ] CORS Enabled XSS http://brutelogic.com.br/blog/cors-enabled-xss/
"CORS(跨域资源共享) Enabled XSS: https://t.co/QP7iOz799n"
-
[ Windows ] @ tourismgeek @ Taylorb_msft @ jsnover @ PowerShell_Team just put out an SDK for PowerShell Core on Nano: https://www.powershellgallery.com/packages/Microsoft.PowerShell.NanoServer.SDK/1.0.0.4
"NanoServer 的 PowerShell SDK ︰ https://t.co/V5yWSS2Pzb"