12月15日安全热点 - 网络中立之争/新的ICS攻击框架

阅读量    29744 |

分享到: QQ空间 新浪微博 微信 QQ facebook twitter

 

资讯类

澳大利亚数据泄露通知相关法律即将实施,众多厂商临近最后期限

http://idm.net.au/article/0011798-time-tackle-pii-data-2018-data-breach-deadline

 

FortiClient错误的访问控制泄露了用户VPN凭证

http://securityaffairs.co/wordpress/66727/hacking/forticlient-improper-access-control.html

 

美国联邦通信委员会主席拜耳和他的两位共和党专员投票决定废除奥巴马的网络中立条例,据他讲废除网络中立只会帮助消费者,促进企业之间竞争

https://www.bleepingcomputer.com/news/security/fcc-kills-net-neutrality-what-does-that-mean-for-you/

 

顶级安全公司Fox-IT承认受到中间人攻击

https://www.bleepingcomputer.com/news/security/top-security-firm-admits-to-mitm-security-incident/

 

技术类

攻击者部署新的ICS攻击框架“Triton”并用其进行攻击活动

https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html

 

SECCON 2017 Baby Stack

https://teamrocketist.github.io/2017/12/13/Pwn-SECCON-Baby-Stack/

 

Mcafee中国网络犯罪调查

https://securingtomorrow.mcafee.com/mcafee-labs/chinese-cybercriminals-develop-lucrative-hacking-services/

 

一次“事故”,众多网站流量被导向俄罗斯

https://arstechnica.com/information-technology/2017/12/suspicious-event-routes-traffic-for-big-name-sites-through-russia/

 

Dolphin浏览器之利用安卓备份恢复特性(CVE-2017-17551)

https://versprite.com/og/exploiting-dolphin-browser-backup-restore/

 

Subverting Trust in Windows

https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf

 

Safari客户端攻击中的信、劣、失

https://medium.com/@wallarm/the-good-the-bad-and-the-ugly-of-safari-in-client-side-attacks-56d0cb61275a

 

利用PGP保护代码完整性

https://github.com/lfit/itpol/blob/master/protecting-code-integrity.md

 

Intel内存加密技术之多键加密

https://software.intel.com/sites/default/files/managed/a5/16/Multi-Key-Total-Memory-Encryption-Spec.pdf

 

Git——当你遇到错误该怎么办

https://github.com/k88hudson/git-flight-rules

 

Windows利用的替代原语

https://www.coresecurity.com/blog/making-something-out-zeros-alternative-primitive-windows-kernel-exploitation

 

安全加密实现的程序分析

https://s3.amazonaws.com/cybersec-prod/secdev/wp-content/uploads/2017/06/26173848/Program-Analysis-of-Cryptographic-Implementations-for-Security.pdf

分享到: QQ空间 新浪微博 微信 QQ facebook twitter
|推荐阅读
|发表评论
|评论列表
加载更多