
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Attack ] Benchmarking memcmp() for timing attacks http://nzzl.us/XODmrKb
"内存比较 memcmp() 引入的 TIMING ATTACKS(侧信道攻击)漏洞: https://t.co/YP66bDkn5F"
-
[ Browser ] Safari Browser: Memory corruption in Array concat https://bugs.chromium.org/p/project-zero/issues/detail?id=1095
" Safari Browser Array.concat 方法中越界的内存拷贝可导致内存破坏(CVE-2017-2464): https://t.co/nx6YKwNUwJ "
-
[ Conference ] Ruxcon 2017 Call For Presentations released: https://ruxcon.org.au/cfp
"Ruxcon 2017 大会开始公开征集议题︰ https://t.co/lxp7R1YQFv"
-
[ Industry News ] #Stuxnet LNK exploits still widely circulated - http://bit.ly/2oUoQ6C
"据卡巴斯基报告,震网病毒发现 8 年后的今天,其中著名的 LNK 漏洞 Exploits 依然在广泛传播: https://t.co/Ugqn49COpE"
-
[ Malware ] #Spyware writeup recently found on #GooglePlay https://www.zscaler.com/blogs/research/android-spyware-smsvova-posing-system-update-play-store cc @ malwrhunterteam
"Android 间谍软件 SMSVova 在 Google Play Store 上伪装成系统更新: https://t.co/rHd7EjmbBZ "
-
[ Mobile ] Attacking ARM Trustzone using Rowhammer by @ eshardNews (direct link) http://www.eshard.com/wp-content/plugins/email-before-download/download.php?dl=9465aa084ff0f070a3acedb56bcb34f5
"利用 RowHammer 的方式尝试攻击 TrustZone: https://t.co/TGCRWnoqVU "
-
[ Others ] Combating a spate of Java malware with machine learning in real-time https://blogs.technet.microsoft.com/mmpc/2017/04/20/combating-a-wave-of-java-malware-with-machine-learning-in-real-time/
"微软利用机器学习实时防护 Java 恶意软件的攻击: https://t.co/dRJfqpsoc6"
-
[ Popular Software ] A highly critical security release for #Drupal 8.3.1 and 8.2.8 is now available. Update your sites now. https://t.co/72kyC4157a
"Drupal 8-8.2.8 和 8.3.1 版本存在严重的访问绕过漏洞(CVE-2017-6919): https://t.co/72kyC4157a"
-
[ Popular Software ] I just published “PASSFREELY: Oracle & SWIFT at risk” https://medium.com/p/passfreely-oracle-swift-at-risk-eb6886908227
"ShadowBrokers 泄露的 PASSFREELY 工具可用于绕过 Oracle 的认证: https://t.co/USMyJMN9O5"
-
[ SecurityProduct ] How we found 100+ RCE vulnerabilities in Trend Micro software : http://conference.hitb.org/hitbsecconf2017ams/materials/D1T1%20-%20Steven%20Seeley%20and%20Roberto%20Suggi%20Liverani%20-%20I%20Got%2099%20Trends%20and%20a%20%23%20Is%20All%20Of%20Them.pdf (pdf), Brief : http://blog.malerisch.net/2017/04/trend-micro-threat-discovery-appliance-session-generation-authentication-bypass-cve-2016-8584.html cc @ malerisch
" 在 HITB AMS 2017 会议上,独立安全研究员 malerisch 分享了他是如何在趋势科技产品中挖掘到 200 个 CVE 的: http://blog.malerisch.net/2017/04/trend-micro-threat-discovery-appliance-session-generation-authentication-bypass-cve-2016-8584.html 昨天他又写了一篇 Blog 介绍了一个新发现的趋势科技 TDA 产品 Session 生成认证机制绕过的漏洞: http://conference.hitb.org/hitbsecconf2017ams/materials/D1T1%20-%20Steven%20Seeley%20and%20Roberto%20Suggi%20Liverani%20-%20I%20Got%2099%20Trends%20and%20a%20%23%20Is%20All%20Of%20Them.pdf"
-
[ SecurityReport ] SSL & TLS Penetration Testing : https://www.aptive.co.uk/blog/tls-ssl-security-testing/
"SSL/TLS 安全评估指南︰ https://t.co/3xoxMr8Qmi"
-
[ SecurityReport ] Threat intel report Key finding 1. A majority of attackers are still relying on user interactions to create threats: http://r-7.co/2oO8We1
"RAPID7 2017 第一季度威胁报告: https://www.rapid7.com/globalassets/_pdfs/research/rapid7-threat-report-2017-q1.pdf"
-
[ SecurityReport ] Technical details on the Lazarus Group and the SWIFT bank attacks https://securelist.com/files/2017/04/Lazarus_Under_The_Hood_PDF_final.pdf
"卡巴斯基针对经常攻击金融机构的 Lazarus 组织的详细分析报告: https://t.co/45XSLFkXVo"
-
[ Vulnerability ] CVE-2017-0199 Python script to #exploit Microsoft RTF #RCE Author: @ bhdresh #meterpreter https://github.com/bhdresh/CVE-2017-0199
"针对 CVE-2017-0199 的 Python 漏洞利用脚本,自动生成恶意 RTF 文件以执行指定 Payload: https://t.co/5OduqRxd8P"
-
[ Windows ] Abusing Nvidia Node.js to Bypass AppLocker/Device Guard Whitelisting: http://blog.sec-consult.com/2017/04/application-whitelisting-application.html https://t.co/DuFqeFtl16
" 滥用 NVDIA 的 node.js 以绕过应用程序白名单限制︰ https://t.co/kAvlcSbfBh "
-
[ Windows ] Better performance and more developer features (spoilers! WebAssembly and shared memory) in Edge and ChakraCore. https://blogs.windows.com/msedgedev/2017/04/20/improved-javascript-performance-webassembly-shared-memory/#4S22DBw3oW4ZeiQV.97
"Windows 10 Creators 中,Edge 浏览器除了性能提高之外,还带来了三个实验性的特性:WebAssembly、Shared Memory、Atomics: https://t.co/C4rTtr8ba8"
-
[ Fuzzing ] Modern fuzzing of C/C++ Projects 项目的资料 - libfuzzer-workshop,其中分多个章节介绍了如何用 libfuzzer Fuzz C/C++ 的代码项目: https://github.com/Dor1s/libfuzzer-workshop