January 21-daily security knowledge highlights 10:08:48 Source: 360 Security broadcast read: 71 likes (0) favorites
Share:
1. in-depth analysis of CVE-2016-0010: Microsoft Office rtf file processing heap overflow vulnerability
Http://blog.fortinet.com/post/deep-analysis-of-cve-2016-0010-microsoft-office-rtf-file-handling-heap-overflow-vulnerability
2. Linux kernel drop Part 1
Https://cyseclabs.com/page? N = 17012016
3. server security: OSSEC integrates slack and pagerduty
Https://blog.sucuri.net/2016/01/server-security-integrating-ossec-with-slack-and-pagerduty.html
4. a new wave of attacks on Ukraine's power industry
Http://www.welivesecurity.com/2016/01/20/new-wave-attacks-ukrainian-power-industry/
5. the Android Trojan is pre-installed on the Philips s307 firmware.
Http://news.drweb.com/show? I = 9792 & lng = en & c = 5
6. BSides NYC 2016 security meeting PPT
Https://github.com/bsidesnyc/BSidesNYC2016/wiki/Agenda
7. opencart lfi mitigates bypass
Http://www.openwall.com/lists/oss-security/2016/01/19/16
8. Asacub Trojan: from spyware to Bank Malware
Https://securelist.com /? P = 73211
9. these devices try to secure IOT
Http://motherboard.vice.com/read/these-devices-are-trying-to-secure-the-internet-of-hackable-things
10. spoof VoIP using Flooding SIP
Http://resources.infosecinstitute.com/cheating-voip-security-by-flooding-the-sip/
11. DNS-based traffic attacks
Https://nymity.ch/dns-traffic-correlation/
12. understand wmi malware
Http://la.trendmicro.com/media/misc/understanding-wmi-malware-research-paper-en.pdf
13. SSH tunnel Fun And profit
Http://blog.cylance.com/puttering-into-the-future
Http://www.everythingcli.org/ssh-tunnelling-for-fun-and-profit-autossh/
14. GCC tiny: build the GCC frontend language
Http://thinkingeek.com/gcc-tiny/
15. attackers sought to crack the ultimate hardware control.
Https://blogs.mcafee.com/mcafee-labs/attackers-seek-to-hack-hardware-for-ultimate-control/
16. Music-style advertisement software leads to Angler
Https://blog.malwarebytes.org/fraud-scam/2016/01/tech-support-scammers-lure-users-with-fake-norton-warnings-turn-out-to-be-symantec-reseller/
Http://research.zscaler.com/2016/01/music-themed-malvertising-lead-to-angler.html
17. misuse of SQLITE3 word divider to bypass php Security restrictions
Http://chichou.0ginr.com/blog/1336/abuse-sqlite3-ext-to-bypass-php-security-restrictions
18. Avast sandbox escape
Http://code.google.com/p/google-security-research/issues/detail? Id = 700 # c3
This article was originally published by 360 Security broadcast. if you need to reprint it, please indicate the source and address of this article. Address: http://bobao.360.cn/news/detail/2653.html