2月27日安全热点 - Cellebrite可解锁所有iPhone/网页矿工威胁

阅读量    85038 |

分享到: QQ空间 新浪微博 微信 QQ facebook twitter

 

资讯类

某广告网络网络公司使用DGA算法绕过广告拦截器并在浏览器内部署矿工

https://www.bleepingcomputer.com/news/security/ad-network-uses-dga-algorithm-to-bypass-ad-blockers-and-deploy-in-browser-miners/

安全客相关阅读:https://www.anquanke.com/post/id/99039

 

以色列供应商Cellebrite可解锁所有iPhone,包括当前的iPhone X
https://news.hitb.org/content/israel-based-vendor-cellebrite-can-unlock-every-iphone-including-current-gen-iphone-x

 

 RIG exploit kit已不再传播恶意软件,而将重心放到加密矿工的传播上

https://www.bleepingcomputer.com/news/security/the-rig-exploit-kit-has-forsaken-ransomware-for-coinminers/

https://www.bleepingcomputer.com/news/security/malware-epidemic-monero-mining-campaigns-are-becoming-a-real-problem/

Rig EK One Year Later: From Ransomware to Coin Miners and Information Stealers

 

20000个ETH被盗却被神秘归还

https://www.bleepingcomputer.com/news/cryptocurrency/hacker-returns-26-million-worth-of-ethereum-back-to-hacked-company/

http://www.zdnet.com/article/hacker-returns-20000-eth-stolen-during-coindash-ico/

 

移动勒索软件和银行恶意软件威胁正在增长
https://www.darkreading.com/mobile/threats-from-mobile-ransomware-and-banking-malware-are-growing-/d/d-id/1331140

 

5月末起Windows XP、Vista和Apple TV第一代将不能使用iTunes

苹果已宣布从2018年5月25日起,iTunes将不再受Windows XP、Vista和Apple TV第一代支持。这些用户将无法使用iTunes Store进行购买或下载。为了购买或访问您以前购买的内容,您需要在更新的操作系统上使用iTunes。

https://www.bleepingcomputer.com/news/security/apple-dropping-itunes-support-for-apple-tv-1st-gen-windows-xp-and-vista/

 

技术类

2017中国高级持续性威胁(APT)研究报告

https://www.anquanke.com/post/id/98972

 

OMG — 将物联网设备变成代理服务器的Mirai变种

https://www.anquanke.com/post/id/99069

 

SQL注入:9种绕过Web应用程序防火墙的方式

https://www.digitalmunition.me/2018/02/sql-injection-9-ways-bypass-web-application-firewall/

 

ArcSight简介-ArcSight技术系列之一

https://mp.weixin.qq.com/s?__biz=MzI2MjQ1NTA4MA==&mid=2247483846&idx=1&sn=22671cab5c81369c4d9135b2a604a421&chksm=ea4bab81dd3c22972d3112979eb089b50a23786b7af78f7cb34451d4723fb72be650056184d9#rd

 

最容易阅读的Metasploit指南

https://a.ndronic.us/guides/metasploit/html/index.html

 

将Raspberry PI 3设置为AWS VPN客户网关

https://hackernoon.com/setup-raspberry-pi-3-as-aws-vpn-customer-gateway-7432f653707

 

CRANKSHAFT: OPEN SOURCE CAR COMPUTER

https://hackaday.com/2018/02/26/crankshaft-open-source-car-computer/

https://github.com/htruong/crankshaft

 

CloudMe Sync 1.10.9 – 基于堆栈的缓冲区溢出

https://www.exploit-db.com/exploits/44175/

 

Disk Savvy Enterprise 10.4.18 – 基于堆栈的缓冲区溢出

https://www.exploit-db.com/exploits/44174/

 

AsusWRT局域网 – 未经身份验证的远程执行代码

https://www.exploit-db.com/exploits/44176/

 

JavaScript的反调试技术(上篇)

http://www.4hou.com/technology/10470.html

 

基于 S2E 符号执行分析平台自动化地发现漏洞、生成 PoC

https://github.com/S2E/docs/blob/master/src/Tutorials/pov.rst

 

WebEye-自动化恶意 HTTP 流量收集工具

https://arxiv.org/pdf/1802.06012.pdf

 

CloudMapper创建AWS环境的网络图

https://github.com/duo-labs/cloudmapper

 

Puszek—— linux rootkit

https://github.com/Eterna1/puszek-rootkit

 

分享到: QQ空间 新浪微博 微信 QQ facebook twitter
|推荐阅读
|发表评论
|评论列表
加载更多