
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Android ] Our root team's observation of Android kernel defense: http://keenlab.tencent.com/en/2016/06/01/Emerging-Defense-in-Android-Kernel/ @ idl3r @ returnsme @ NWMonster
" Android 内核的防御新技术总结,来自科恩实验室 Blog︰ https://t.co/hZE2ZKuXHp "
-
[ Android ] Android安全开发之Provider组件安全 - http://jaq.alibaba.com/community/art/show?spm=a313e.7916646.24000001.1.JVyUd2&articleid=352
"Android 安全开发之 Provider 组件安全,来自阿里聚安全团队: https://t.co/EpurkgpRU0"
-
[ Android ] 安卓动态调试七种武器之长生剑 - Smali Instrumentation http://jaq.alibaba.com/community/art/show?articleid=339
"安卓动态调试七种武器之长生剑 - Smali Instrumentation,来自阿里聚安全团队: https://t.co/IqEeNTSIMl"
-
[ Android ] 移动平台千王之王大揭秘 - http://blogs.360.cn/360mobile/2016/06/02/gamble_ecosystem_on_mobile/
"移动平台千王之王大揭秘,来自 360 烽火实验室: https://t.co/9wnGPD8EgA"
-
[ Android ] MopEye is a per-app network perf monitor for Android based on VpnService: https://play.google.com/store/apps/details?id=com.mopeye Short paper: https://daoyuan14.github.io/papers/CoNEXT15_Poster_MopEye.pdf
"MopEye - 一个基于 VPN 服务、用于监控 Android APP 网络活动的工具, 应用下载︰ https://t.co/KSv8fUgDTa Paper︰ https://t.co/Bv7Q0QryCr"
-
[ Attack ] #IRONGATE ICS-focused #malware: masking malicious activity on SCADA systems http://bddy.me/1sOIjpF
"IRONGATE - 专门攻击西门子工控系统的恶意软件家族,来自 FireEye Blog: https://t.co/uWMiIb4i4f "
-
[ Attack ] Get your guide of #zeroday exploits to learn how attacks happen and how to protect: http://symc.ly/20U14Dc #0day https://t.co/Esd8q84uze
" 0Day 攻击是如何发生的,又该如何防御,来自 Symantec Blog︰ https://t.co/oB9sQuq8dQ https://t.co/Esd8q84uze"
-
[ Attack ] 美人鱼行动:长达6年的境外定向攻击活动揭露 - http://www.freebuf.com/articles/network/105726.html
"美人鱼行动:长达6年的境外定向攻击活动揭露,来自 FreeBuf,作者为 360 天眼实验室: https://t.co/NxctbuvGHq"
-
[ Attack ] Deconstructing a Dropbox Phish http://garwarner.blogspot.com/2016/06/deconstructing-dropbox-phish.html
" 对一次 Dropbox 钓鱼攻击事件的分析: https://t.co/jqPM0MpQVT"
-
[ Attack ] #TorrentLocker's latest campaign exploits Spain's largest electric utility: http://intel.ly/1ROQirv #ransomware https://t.co/p7agbOvti8
" TorrentLocker 勒索软件最近攻击了西班牙最大的电力公司,来自 McAfee Blog︰ https://t.co/2HKPkJPE8l https://t.co/p7agbOvti8"
-
[ Attack ] #TeamViewer breached: PCs hijacked, PayPal accounts raided as TeamViewer falls..http://www.theregister.co.uk/2016/06/01/teamviewer_mass_breach_report/ via @ theregister
"TeamViewer 用户反馈自己的电脑被黑、银行账户被清空,疑似 TeamViewer 被黑。但 TeamViewer 官方否认了这一说法,来自 TheRegister 的报道: https://t.co/fc8rQlYClE Reddit 上的讨论: https://www.reddit.com/r/teamviewer "
-
[ Backdoor ] JavaPoly.js - Java(script) in the Browser https://www.javapoly.com/ via @ hasegawayosuke
"JavaPoly.js - 浏览器里的 JVM 实现,有了它,可以在浏览器里直接调用 Java 代码了: https://t.co/Z3cBtORCjk "
-
[ Browser ] NCC Group Blog: When a Trusted Site in Internet Explorer was Anything But - https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/june/when-a-trusted-site-in-internet-explorer-was-anything-but/ by @ exploresecurity
" 当 IE 中的可信站点(Trusted Site)不可信的时候会怎样,来自 NCC Group: https://t.co/xN1AyA0G5G"
-
[ Browser ] Google patched two high severity flaws in Chrome this week - http://ow.ly/vH5L300QZD0
"Chrome 浏览器更新 51.0.2704.79 版本,本次共修复了两个高危漏洞,来自 ThreatPost 的报道: https://t.co/iNuprOaco8 官方 Blog: http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html "
-
[ Browser ] How to write your own Virtual DOM : https://medium.com/@ deathmood/how-to-write-your-own-virtual-dom-ee74acc13060#.yui37egv7
" 虚拟 DOM 树的实现: https://t.co/KASpaHE6aZ"
-
[ Crypto ] We discovered bug in all hash functions of JS crypto library SJCL - https://github.com/bitwiseshiftleft/sjcl/issues/299 Is there a big picture? https://www.dancvrcek.com/software-reliability/
"斯坦福 JavaScript 加密库 SJCL 被发现了一个 Bug,该 Bug 影响所有的 HASH 函数: https://t.co/Y3c8YvSJ5A https://t.co/MVQ3NIwJhC"
-
[ Debug ] one of my favorite resources/tutorials about debugging with lldb: "Dancing in the Debugger — A Waltz with LLDB" https://www.objc.io/issues/19-debugging/lldb-debugging/
" 调试器里的舞蹈之与 LLDB 的华尔兹,来自 OBJ-C Blog: https://t.co/nzNS3Uv9gD"
-
[ Detect ] 漏洞检测的那些事儿 - http://drops.wooyun.org/tips/16431
"漏洞检测的那些事儿,来自乌云 Drops: https://t.co/GjlCI9Y0N9"
-
[ Firmware ] BIOS Disassembly Ninjutsu book. for free! https://github.com/pinczakko/BIOS-Disassembly-Ninjutsu-Uncovered
"BIOS 逆向分析大揭秘(电子书): https://t.co/npilth04ID"
-
[ IoTDevice ] #Reversing and #Exploiting Embedded Devices (Part 1): The Software Stack http://praee.com/1XT8rLG via @ B1ack0wl #IoT https://t.co/F8km5NaFeX
" 嵌入式设备的逆向和漏洞利用 Part 1:软件部分: https://t.co/F8km5NaFeX https://t.co/at1AUDSgQw"
-
[ MachineLearning ] How the Android security team is using neural networks to increase security: http://www.wired.com/2016/06/googles-android-security-team-turns-machine-learning + adblock fix: https://t.co/4GkCrZtS0N
"Android 安全团队是如何利用神经网络提高安全性的,来自 Wired 的报道︰ https://t.co/Q3obQar96Z https://t.co/4GkCrZtS0N"
-
[ Malware ] Malware - Analysing and Repurposing RIG's CVE-2015-8651 http://vulnerablespace.blogspot.gr/2016/06/malware-analysing-and-repurposing-rigs.html
" RIG EK CVE-2015-8651 漏洞的分析和再利用: https://t.co/mWJBhlBj2U"
-
[ Malware ] Diligence is the Mother of Good Locky Detection http://blog.fortinet.com/2016/06/01/diligence-is-the-mother-of-good-locky-detection
" Fortinet 对 Locky 勒索软件最近动态的分析: https://t.co/SL4SIbbnpr"
-
[ OpenSourceProject ] If you've ever wondered how WebKit engineers diagnose and fix a crash bug in JavaScriptCore: https://webkit.org/blog/6411/javascriptcore-csi-a-crash-site-investigation-story/ https://t.co/z0jKhESMJ8
" WebKit 工程师是如何分析并修复 JavaScriptCore 中的 Crash Bug 的,来自 WebKit Blog: https://t.co/8W4IjB3QA5 https://t.co/z0jKhESMJ8"
-
[ Others ] Blog post on Kerberos / AD fun under *NIX https://passing-the-hash.blogspot.com/2016/06/nix-kerberos-ms-active-directory-fun.html
"混合 *NIX Kerberos 与 Windows AD 认证服务: https://t.co/ItuLiiiwcx 作者还有一篇相关文章: https://passing-the-hash.blogspot.com/2016/06/im-pkdc-your-personal-kerberos-domain.html "
-
[ Others ] We've put Flush+Flush cache attack examples online: https://github.com/IAIK/flush_flush @ BloodyTangerine will present the paper @ #DIMVA2016 next month!
" 前段时间推送过一篇谈 'Flush+Flush' 缓存攻击技术的 Paper,昨天作者在 GitHub 公开了示例代码︰ https://t.co/0v7VPI9YUs Paper: https://www.semanticscholar.org/paper/Flush-Flush-A-Fast-and-Stealthy-Cache-Attack-Gruss-Maurice/46b9ee6b0a9c257f2377c7834a44636d0e31e860/pdf "
-
[ Others ] Here are some great videos explaining what's new in PowerShell V5 https://mva.microsoft.com/en-US/training-courses/whats-new-in-powershell-v5-16434
" PowerShell V5 版本的新变化,来自微软官方的视频介绍: https://t.co/YWjm5Nrvdj "
-
[ Others ] Researcher OSS team led by Ralf Spenneberg Create Self-Propagating Worm That Targets SCADA Equipment http://news.softpedia.com/news/researchers-create-self-propagating-worm-that-targets-scada-equipment-503860.shtml
" 德国 OSS 安全团队的研究员写了一个 PLC 蠕虫 PoC,来自 SoftPedia 的报道: https://t.co/CLbQx7t1fZ "
-
[ Others ] "#HackingTeam #Breach: A #Cyber Jurassic Park" My blog shamelessly steals @ craiu's paleontologist metaphor :) https://blogs.microsoft.com/cybertrust/2016/06/01/hacking-team-breach-a-cyber-jurassic-park/
" Hacking Team 数据泄漏事件 - 一个网络版的侏罗纪公园,来自微软 Blog: https://t.co/wsjXpfiXhC"
-
[ Popular Software ] PHP 5.4.34 unserialize UAF exploit http://blog.knownsec.com/2016/06/php-5-4-34-unserialize-uaf-exploit/ by niubl of Knownsec 404 Security Team
"PHP 5.4.34 unserialize UAF Exploit,来自知道创宇 404 团队: https://t.co/ti0X2ECbgW "
-
[ Web Security ] How to find #XSS vulnerabilities in flash files. https://olivierbeg.com/finding-xss-vulnerabilities-in-flash-files/
"如何在 Flash 文件中找 XSS 漏洞: https://t.co/TBUMIHa2w0"
-
[ Web Security ] WP Mobile Detector Vulnerability Being Exploited in the Wild https://blog.sucuri.net/2016/06/wp-mobile-detector-vulnerability-being-exploited-in-the-wild.html
" WordPress Mobile Detector 插件任意文件上传 0Day 正在被野外攻击,目前还没有可用的补丁: https://t.co/UHUDBLOKP3"
-
[ Web Security ] MongoDB security – Injection attacks with php : http://blog.securelayer7.net/mongodb-security-injection-attacks-with-php/ cc @ nikhilmittal641 || @ SandeepL337
" PHP MongoDB 数据库注入攻击: https://t.co/2EV4DxKDvq "
-
[ Windows ] C/C++ pointers: pointers abuse in Windows kernel http://yurichev.com/blog/ptrs3/
" Windows 内核中对 C/C++ 指针的滥用: https://t.co/7UnzFKsJVe"