11月28每日安全热点 - Check Point 对后门木马Bandook的分析

admin 2023-11-29 19:32:11 AnQuanKeInfo 来源:ZONE.CI 全球网 0 阅读模式

漏洞 Vulnerability WebLogic one GET request RCE分析(CVE-2020-14882+CVE-2020-14883) https://lucifaer.com/2020/11/25/WebLogic%20one%20GET%20request%20RCE%E5%88%86%E6%9E%90%EF%BC%88CVE-2020-14882+CVE-2020-14883%EF%BC%89/ Chrome在野0day(cve-2020-16009)Type Confusion漏洞分析 https://mp.weixin.qq.com/s/ixlVa6Db_yTpuzLd4lOSQQ Microsoft Windows Win32k本地提权漏洞分析 https://mp.weixin.qq.com/s/X2S7Oh3k4_4hn4pN8KdtTA 恶意软件 Malware 分析一个Ursnif VBS dropper https://malware.love/malware_analysis/reverse_engineering/2020/11/27/analyzing-a-vbs-dropper.html Check Point 对后门木马Bandook的分析 https://research.checkpoint.com/2020/bandook-signed-delivered/ 对媒体公司的APT27攻击分析 https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/incident-response-polar-ransomware-apt27/ 钱包黑洞:Lazarus 组织近期在加密货币方面的隐蔽攻击活动 https://www.anquanke.com/post/id/223817 安全工具 Security Tools teler:基于Web日志的实时入侵检测和威胁警报工具 https://github.com/kitabisa/teler Joker:一个Java攻击框架 https://github.com/Lucifaer/Joker 安全研究 Security Research 对SHA-256算法的攻击研究 https://medium.com/bugbountywriteup/sat-solver-optimization-and-belief-propagation-attacks-on-sha-256-33c0233440e9 某SCADA的远程代码执行漏洞挖掘与利用 https://mp.weixin.qq.com/s/RZZWnCnDjvBOwmxj03zJbQ 在受限环境中躲避检测的故事:DLL旁加载+ Phantom DLL镂空+ Google Apps脚本实现与C&C通信 https://www.blackarrow.net/hindering-threat-hunting-a-tale-of-evasion-in-a-restricted-environment/ 有安全研究者混入了PHP 8.0开发组! https://mp.weixin.qq.com/s/0HSAPYY2PjbwEN3MhI4SkA 基于Outlook邮件的驻留技术研究 https://www.mdsec.co.uk/2020/11/a-fresh-outlook-on-mail-based-persistence/
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0