2016-01-21 10:08:48 Source: 360 Safe Broadcast read: 71 likes (0) Favorites
Share to:
1. In-depth analysis cve-2016-0010: Microsoft Office RTF file Processing Heap Overflow Vulnerability
http://blog.fortinet.com/post/ Deep-analysis-of-cve-2016-0010-microsoft-office-rtf-file-handling-heap-overflow-vulnerability
2.linux Core ROP Part I.
https://cyseclabs.com/page?n=17012016
3. Server security: ossec integrated Slack and Pagerduty
Https://blog.sucuri.net/2016/01/server-security-integrating-ossec-with-slack-and-pagerduty.html
4. A new wave of attacks on the electricity industry in Ukraine
http://www.welivesecurity.com/2016/01/20/new-wave-attacks-ukrainian-power-industry/
5.andorid Trojan Pre-installed in Philips S307 firmware
http://news.drweb.com/show/?i=9792&lng=en&c=5
6.BSides NYC 2016 security Conference PPT
Https://github.com/bsidesnyc/BSidesNYC2016/wiki/Agenda
7.OPENCART Lfi Mitigation Bypass
Http://www.openwall.com/lists/oss-security/2016/01/19/16
8.Asacub Trojan: From spyware to bank malware
https://securelist.com/?p=73211
9. These devices try to secure IoT
Http://motherboard.vice.com/read/these-devices-are-trying-to-secure-the-internet-of-hackable-things
10. Spoofing VoIP via flooding sip
http://resources.infosecinstitute.com/cheating-voip-security-by-flooding-the-sip/
11. DNS-based traffic attacks
https://nymity.ch/dns-traffic-correlation/
12. Understand WMI Malicious software
Http://la.trendmicro.com/media/misc/understanding-wmi-malware-research-paper-en.pdf
13.SSH Tunnel Fun and profit
http://blog.cylance.com/puttering-into-the-future
http://www.everythingcli.org/ssh-tunnelling-for-fun-and-profit-autossh/
14.GCC Tiny: Building the language of the GCC front-end
http://thinkingeek.com/gcc-tiny/
15. Attackers seek to decode the ultimate control of hardware
https://blogs.mcafee.com/mcafee-labs/attackers-seek-to-hack-hardware-for-ultimate-control/
16. Music-style adware leads to angler
https://blog.malwarebytes.org/fraud-scam/2016/01/ tech-support-scammers-lure-users-with-fake-norton-warnings-turn-out-to-be-symantec-reseller/
Http://research.zscaler.com/2016/01/music-themed-malvertising-lead-to-angler.html
17. Misuse of the SQLITE3 word breaker bypasses PHP security restrictions
Http://chichou.0ginr.com/blog/1336/abuse-sqlite3-ext-to-bypass-php-security-restrictions
18.Avast Sandbox escape
Http://code.google.com/p/google-security-research/issues/detail?id=700#c3
This article by 360 security broadcast original release, if need reprint please indicate source and this article address. This address: http://bobao.360.cn/news/detail/2653.html